Legerdemain: An Illusion-based system to thwart covert access and exfiltration

Award Information
Agency:
Department of Defense
Branch
Office of the Secretary of Defense
Amount:
$99,821.00
Award Year:
2009
Program:
SBIR
Phase:
Phase I
Contract:
FA8650-10-M-1763
Award Id:
91401
Agency Tracking Number:
O092-IA2-1124
Solicitation Year:
n/a
Solicitation Topic Code:
n/a
Solicitation Number:
n/a
Small Business Information
315 Wynn Drive, Suite 1, Huntsville, AL, 35805
Hubzone Owned:
N
Minority Owned:
N
Woman Owned:
N
Duns:
174265736
Principal Investigator:
Al Underbrink
Senior Analyst II
(256) 430-0860
al.underbrink@sentar.com
Business Contact:
Peter Kiss
Chief Executive Officer
(256) 430-0860
peter.kiss@sentar.com
Research Institution:
n/a
Abstract
The integration of software and components from multiple sources, the interconnection of systems via the internet, and the rapid pace of change in the computer industry as a whole virtually guarantee the continued emergence of threats to systems and information via new and undetected vulnerability vectors. Moreover, malicious insiders and social engineering can also be involved in cases of covert access, as can access points that must be kept open for normal system operations. Even in cases where software and hardware exist and remediation is possible, vendors often cannot be counted on to provide solutions in a timely manner. Taken together, these factors present an opportunity to attackers, giving them numerous avenues of attack, and consequently, "first move" advantage. There is therefore a need to restore initiative to the legitimate administrators of systems that are vulnerable to attack. Sentar, Inc. and Lockheed Martin have teamed to develop Legerdemain. Legerdemain protection strategies consist of combinations of deceptive techniques that can be either anticipatory or reactive. The Legerdemain approach applies illusionist "sleight of hand" techniques to manipulate both the items to be protected and the protection mechanisms in order to secure CPI against network-based attacks, host-based attacks, and reverse engineering.

* information listed above is at the time of submission.

Agency Micro-sites


SBA logo

Department of Agriculture logo

Department of Commerce logo

Department of Defense logo

Department of Education logo

Department of Energy logo

Department of Health and Human Services logo

Department of Homeland Security logo

Department of Transportation logo

Enviromental Protection Agency logo

National Aeronautics and Space Administration logo

National Science Foundation logo
US Flag An Official Website of the United States Government