Countermeasures to Covert Access Methods to Reduce Attack Susceptibility and Ensure Trust
Department of Defense
Agency Tracking Number:
Solicitation Topic Code:
Small Business Information
EDAptive Computing, Inc.
1245 Lyons Road, Building G, Dayton, OH, 45458
Socially and Economically Disadvantaged:
AbstractOur proposal specifically addresses the stated requirements of the solicitation; we will develop software and data protection tools to detect and provide countermeasures to sophisticated covert access methods on computer systems. This includes hardware-based attacks which are currently undetectable through software-only approaches. The proposed EDAptive® TrEMBlE solution builds on previous EDAptive Computing, Inc (ECI) knowledge and technology – itself innovative – to provide detection of hardware-assisted attacks, otherwise undetectable through software only approaches. The resulting capabilities will result in a customized PCIe device and co-processor which will monitor traffic between non-trusted devices, detect anomalies, and create decoys for maliciously coded firmware attacks.
* information listed above is at the time of submission.