Legerdemain: An Illusion-based system to thwart covert access and exfiltration

Award Information
Agency: Department of Defense
Branch: Air Force
Contract: FA8650-10-M-1763
Agency Tracking Number: O092-IA2-1124
Amount: $99,821.00
Phase: Phase I
Program: SBIR
Awards Year: 2009
Solicitation Year: 2009
Solicitation Topic Code: OSD09-IA2
Solicitation Number: 2009.2
Small Business Information
315 Wynn Drive, Suite 1, Huntsville, AL, 35805
DUNS: 174265736
HUBZone Owned: N
Woman Owned: Y
Socially and Economically Disadvantaged: N
Principal Investigator
 Al Underbrink
 Senior Analyst II
 (256) 430-0860
Business Contact
 Peter Kiss
Title: Chief Executive Officer
Phone: (256) 430-0860
Email: peter.kiss@sentar.com
Research Institution
The integration of software and components from multiple sources, the interconnection of systems via the internet, and the rapid pace of change in the computer industry as a whole virtually guarantee the continued emergence of threats to systems and information via new and undetected vulnerability vectors. Moreover, malicious insiders and social engineering can also be involved in cases of covert access, as can access points that must be kept open for normal system operations. Even in cases where software and hardware exist and remediation is possible, vendors often cannot be counted on to provide solutions in a timely manner. Taken together, these factors present an opportunity to attackers, giving them numerous avenues of attack, and consequently, “first move” advantage. There is therefore a need to restore initiative to the legitimate administrators of systems that are vulnerable to attack. Sentar, Inc. and Lockheed Martin have teamed to develop Legerdemain. Legerdemain protection strategies consist of combinations of deceptive techniques that can be either anticipatory or reactive. The Legerdemain approach applies illusionist “sleight of hand” techniques to manipulate both the items to be protected and the protection mechanisms in order to secure CPI against network-based attacks, host-based attacks, and reverse engineering.

* Information listed above is at the time of submission. *

Agency Micro-sites

SBA logo
Department of Agriculture logo
Department of Commerce logo
Department of Defense logo
Department of Education logo
Department of Energy logo
Department of Health and Human Services logo
Department of Homeland Security logo
Department of Transportation logo
Environmental Protection Agency logo
National Aeronautics and Space Administration logo
National Science Foundation logo
US Flag An Official Website of the United States Government