Software Protection by Polymorphic and Metamorphic Transformations
Department of Defense
Agency Tracking Number:
Solicitation Topic Code:
Small Business Information
9 Forrest Street, Alexandria, VA, 22305
Socially and Economically Disadvantaged:
AbstractSoftware critical to national security and essential to a corporation’s survival can easily be exploited through reverse engineering and unauthorized access. Without innovative protection initiatives, these vulnerabilities can be leveraged by an attacker to distribute a program without proper authority, tamper with its intended functionality, expose proprietary algorithms, and launch viruses/worms against identical applications on distributed hosts. When the attacker is a malicious insider, the challenge grows more complex because they may have decryption keys and are likely knowledgeable of auditing and detection capabilities. Therefore, to be successful, software protection mechanisms must be capable of defending against all methods of attack, including insider threats. During Phase I, Pikewerks drew upon the importance of diversity in application binaries to develop a prototype, ELECTRONIC ARMOR, that is capable of protecting software from various types of attacks. In Phase II, the prototype will be expanded and matured to include additional layers of polymorphic/metamorphic transformations, deception, and anti-tamper mechanisms that can be embedded within a binary. The product of Phase II will be a software security and digital rights management technology that can be successfully incorporated into both Government and commercial applications with minimal performance impact.
* information listed above is at the time of submission.