Subspace Techniques for Obfuscating Matrix-based Algorithms (STOMA)

Award Information
Agency:
Department of Defense
Branch
Army
Amount:
$750,000.00
Award Year:
2008
Program:
STTR
Phase:
Phase II
Contract:
W31P4Q-08-C-0498
Award Id:
83223
Agency Tracking Number:
A074-002-0293
Solicitation Year:
n/a
Solicitation Topic Code:
n/a
Solicitation Number:
n/a
Small Business Information
500 West Cummings Park - Ste 3000, Woburn, MA, 01801
Hubzone Owned:
N
Minority Owned:
N
Woman Owned:
N
Duns:
859244204
Principal Investigator:
TonyFalcone
Grp Lead: Image Exploitation
(781) 933-5355
afalcone@ssci.com
Business Contact:
JayMiselis
Corporate Controller
(781) 933-5355
jmiselis@ssci.com
Research Institute:
UNIV. OF ARIZONA
Mark Neifeld
888 N. Euclid Ave., Rm 515
Tucson, AZ, 85721
(520) 621-6102
Nonprofit college or university
Abstract
Scientific Systems Co., Inc. (SSCI) and its academic partner, the University of Arizona, have devised a comprehensive and effective methodology for offering software anti-tamper protection via Algorithm Obfuscation. A primary goal going into Phase I was to apply our techniques in the Kalman Filter setting; this example was completed successfully. Thus, we now have a collection of obfuscation techniques that can be used to render an algorithm unrecognizable. In Phase II we will assemble these powerful obfuscation techniques and construct what we have called an "Obfuscating Compiler." Like a more conventional compiler, it will accept algorithms that have been expressed in a "High Level Language" and produce code in a more primitive form. This code is designed so as to make the underlying algorithm completely obscured while remaining functionally equivalent to the original. In Phase III, we will expand this prototype into a robust tool capable of widespread use. This will include, but may not be limited to combining matrix-level algorithm obfuscation with more traditional software obfuscation techniques. Note that we have developed a "meta-algorithm" that can be applied to large classes of matrix-based algorithms, and do not require detailed knowledge of the particular algorithm for which obfuscation is desired.

* information listed above is at the time of submission.

Agency Micro-sites


SBA logo

Department of Agriculture logo

Department of Commerce logo

Department of Defense logo

Department of Education logo

Department of Energy logo

Department of Health and Human Services logo

Department of Homeland Security logo

Department of Transportation logo

Enviromental Protection Agency logo

National Aeronautics and Space Administration logo

National Science Foundation logo
US Flag An Official Website of the United States Government