Software Protection Vulnerability Assessment through Kernel Analysis and Relationship Maps

Award Information
Agency:
Department of Defense
Branch
Office of the Secretary of Defense
Amount:
$99,999.00
Award Year:
2006
Program:
STTR
Phase:
Phase I
Contract:
FA8650-06-M-8076
Award Id:
78116
Agency Tracking Number:
O064-NC4-1011
Solicitation Year:
n/a
Solicitation Topic Code:
n/a
Solicitation Number:
n/a
Small Business Information
2308 Mount Vernon Avenue #212, Alexandria, VA, 22301
Hubzone Owned:
N
Minority Owned:
N
Woman Owned:
N
Duns:
152119025
Principal Investigator:
Sandra Ring
CTO
(703) 969-6404
sandy@pikewerks.com
Business Contact:
Sandra Ring
CEO
(703) 969-6404
sandy@pikewerks.com
Research Institution:
PURDUE UNIV.
Eugene Spafford
CERIAS, 656 Oval Drive
West Lafayette, IN, 47907
(765) 494-7841
Nonprofit college or university
Abstract
Traditional development efforts leave software vulnerable to reverse engineering, tamper, and access by unauthorized individuals (insider threat). While these threats are not new, advancements in easily hidden removable media such as USB drives and memory cards make them more prevalent. One low-cost technique for software protection is to utilize a kernel module capable of securely decrypting and executing protected software without inhibiting the users' activity. To some extent, this approach mimics the concepts employed by kernel "rootkits," or toolkits used by attackers to conceal unauthorized access. Because this approach to software protection is relatively new, few capabilities exist to conduct comprehensive vulnerability analysis. We propose to demonstrate the use of relationship maps as a means of analyzing the strength of these protection capabilities. The maps generated will enable AT-SPI to gather detailed forensics data about the executing software (including the kernel functionality) in a visual form. In addition to beneficial red-team analysis, this technology can be utilized as a security tool to detect and reverse engineer sophisticated kernel rootkits. As our past research has demonstrated, these are highly efficient methods that can be incorporated into both Government and commercial applications with tremendous success.

* information listed above is at the time of submission.

Agency Micro-sites


SBA logo

Department of Agriculture logo

Department of Commerce logo

Department of Defense logo

Department of Education logo

Department of Energy logo

Department of Health and Human Services logo

Department of Homeland Security logo

Department of Transportation logo

Enviromental Protection Agency logo

National Aeronautics and Space Administration logo

National Science Foundation logo
US Flag An Official Website of the United States Government