Mission Critical Software and Database Guard
Small Business Information
4900 University Square, Suite 8, Huntsville, AL, 35816
Chief Executive Officer
Chief Executive Officer
AbstractA major challenge for the management of mission critical software and associated databases is the trustworthiness of data and code.To meet this challenge, Sentar proposes the Software and Database Guard (SDG) to secure Ground-based Midcourse Defense (GMD) mission critical software and databases from malicious code. The proposed approach provides attack sensing and situation awarenessof trust status discrepancies in GMD databases and software. This approach will use advanced technologies such as proof carrying code, statistical anomaly detection, artificial diversity, nested processes, and security wrappers in combination withintelligent sensor agents to provide indications and warnings of malicious data corruption or code tampering to Computer Network Defense (CND) managers.For this SBIR, Sentar is teaming with SYColeman. SYColeman brings extensive experience in Computer Network Defense and DoD related software development to the team. In Phase I of this SBIR, the team will draw upon its previous experience with intelligentmulti-agent systems and network defense. The team will perform a critical evaluation of state-of-the-art trusted software technology and use that assessment to create an SDG design and development plan for the management of mission critical software andassociated databases. The Software and Database Guard will provide military and commercial organizations with a capability to secure a wide range of applications against malicious data corruption or code tampering. No such capability exists today. Anticipated military useof the Software and Database Guard capability includes improved network defense and information superiority for BMC3, GMD, homeland security, intelligence systems, logistics, and C4ISR systems and subsystems. The commercial potential for the Software andDatabase Guard is also extensive. Virtually every company in the U.S. relies on the Internet to conduct business. Because of the growing and ever changing threat posed by hackers and malicious insiders, commercial companies need high quality, state of theart, low cost advanced protection from malicious data corruption or code tampering. Potential applications include industrial control, security applications, power generation networks, financial systems, and supply chain management.
* information listed above is at the time of submission.