Countermeasures to Covert Access Methods to Reduce Attack Susceptibility and Ensure Trust
Small Business Information
1245 Lyons Road, Building G, Dayton, OH, 45458
AbstractOur proposal specifically addresses the stated requirements of the solicitation; we will develop software and data protection tools to detect and provide countermeasures to sophisticated covert access methods on computer systems. This includes hardware-based attacks which are currently undetectable through software-only approaches. The proposed EDAptiver TrEMBlE solution builds on previous EDAptive Computing, Inc (ECI) knowledge and technology - itself innovative - to provide detection of hardware-assisted attacks, otherwise undetectable through software only approaches. The resulting capabilities will result in a customized PCIe device and co-processor which will monitor traffic between non-trusted devices, detect anomalies, and create decoys for maliciously coded firmware attacks.
* information listed above is at the time of submission.