Countermeasures to Covert Access Methods to Reduce Attack Susceptibility and Ensure Trust

Award Information
Agency: Department of Defense
Branch: Air Force
Contract: FA8650-10-M-1765
Agency Tracking Number: O092-IA2-1144
Amount: $99,980.00
Phase: Phase I
Program: SBIR
Awards Year: 2009
Solitcitation Year: 2009
Solitcitation Topic Code: OSD09-IA2
Solitcitation Number: 2009.2
Small Business Information
EDAptive Computing, Inc.
1245 Lyons Road, Building G, Dayton, OH, 45458
Duns: 031764616
Hubzone Owned: N
Woman Owned: N
Socially and Economically Disadvantaged: Y
Principal Investigator
 Jorge Sanchez
 Developer I
 (937) 281-0783
 j.sanchez@edaptive.com
Business Contact
 Praveen Chawla
Title: President
Phone: (937) 281-0790
Email: p.chawla@edaptive.com
Research Institution
N/A
Abstract
Our proposal specifically addresses the stated requirements of the solicitation; we will develop software and data protection tools to detect and provide countermeasures to sophisticated covert access methods on computer systems. This includes hardware-based attacks which are currently undetectable through software-only approaches. The proposed EDAptive® TrEMBlE solution builds on previous EDAptive Computing, Inc (ECI) knowledge and technology – itself innovative – to provide detection of hardware-assisted attacks, otherwise undetectable through software only approaches. The resulting capabilities will result in a customized PCIe device and co-processor which will monitor traffic between non-trusted devices, detect anomalies, and create decoys for maliciously coded firmware attacks.

* information listed above is at the time of submission.

Agency Micro-sites

US Flag An Official Website of the United States Government