Computer Measurement Laboratory, Inc.
We propose to implement a novel countermeasure against the exploitation of integrated circuit hardware. The proposed countermeasure is applicable to both FPGAs and ASICs, increases design obfuscation ...SBIR Phase I 2010 Office of the Secretary of DefenseDepartment of Defense
The activity of an OS kernel may be monitored dynamically in real time. As the kernel executes, the transition among the constituent components of the kernel will follow a predictable pattern represe ...SBIR Phase I 2007 Office of the Secretary of DefenseDepartment of Defense
In an information warfare scenario, the enemy will deploy an attack that has never been seen before. This attack will completely debilitate both defensive and offensive software capabilities. We hav ...SBIR Phase II 2008 Office of the Secretary of DefenseDepartment of Defense
CML proposes to extend its current work in dynamic kernel monitoring for attack recognition and mitigation. The focus of this proposal is on mitigating the effects of an attack on executing software ...SBIR Phase I 2009 Office of the Secretary of DefenseDepartment of Defense
ABSTRACT: This project will investigate the feasibility of an integrated multilevel system for protecting space assets from system hardware and firmware exploitation. The overall strategy is to provi ...SBIR Phase I 2012 Department of Defense
ABSTRACT: The objective of this work is to demonstrate a prototype of an innovative method to protect military space microelectronics from unauthorized tampering. The method will employ the joint coo ...SBIR Phase II 2013 Department of Defense
ABSTRACT: This project will investigate the feasibility of a computing appliance which uses Temporal Virtualization to help ameliorate the effects of malicious software activity. Temporal Virtualizat ...SBIR Phase I 2014 Air ForceDepartment of Defense