COMPUTER VIRUS PREVENTION FOR EMBEDDED COMPUTER WEAPON SYSTEMS

Award Information
Agency: Department of Defense
Branch: Army
Contract: N/A
Agency Tracking Number: 12968
Amount: $55,050.00
Phase: Phase I
Program: SBIR
Awards Year: 1990
Solicitation Year: N/A
Solicitation Topic Code: N/A
Solicitation Number: N/A
Small Business Information
Sparta Inc
23041 Avenida De La Carlota -, Laguna Hills, CA, 92653
DUNS: N/A
HUBZone Owned: N
Woman Owned: N
Socially and Economically Disadvantaged: N
Principal Investigator
 Debra Banning
 (213) 542-6090
Business Contact
Phone: () -
Research Institution
N/A
Abstract
MODERN WEAPON SYSTEMS MAKE EXTENSIVE USE OF EMBEDDED COMPUTER SYSTEMS FOR SUCH CRITICAL FUNCTIONS AS WEAPON AIMING, WEAPON SENSOR PROCESSING AND GUIDANCE, SAFE AND ARMING, AND REAL-TIME CONTROL. THE EXECUTIVION OF THESE FUNCTIONS IS DEPENDENT UPON THE CORRECT OPERATION OF THE SOFTWARE THAT RUNS ON THE EMBEDDED COMPUTERS. RECENTLY, CONCERN HAS BEEN RAISED OVER THE POTENTIAL FOR SABOTAGE OF WEAPONS BY THE INSERTION OF MALICIOUS CODE, EITHER DIRECTLY INTO THE WEAPON APPLICATION CODE OR INDIRECTLY VIA THE APPLICATION SOFTWARE DEVELOPMENT ENVIRONMENT. VIRUSES PROVIDE AN INDIRECT PATH WHICH THE SABOTEUR MAY EXPLOIT TO INTRODUCE MALICOUS CODE INTO CRIFICAL SOFTWARE SYSTEMS. THIS STUDY WILL EXAMINE THE VULNERABILITY OF WEAPON SYSTEM SOFTWARE TO VIRUSES AND IDENTIFY APPROACHES FOR MINIMIZING THE THREAT. THE PROPOSED APPROACH IS TO IDENTIFY INDIRECT PATHS FOR INTRODUCING MALICIOUS CODE INTO WEAPON SYSTEM SOFTWARE, AND TO IDENTIFY HOW A VIRUS CAN BE CONSTRUCTED TO EXPLOIT EACH PATH. OUR APPROACH MAKES USE OF PRIOR WORK IN DEVELOPING TAXONOMIES OF COMPUTER VIRUSES AND THEIR COUNTERMEASURES, AND EXTEND THIS TO THE REALM OF EMBEDDED WEAPON CONTROL COMPUTERS.

* information listed above is at the time of submission.

Agency Micro-sites

US Flag An Official Website of the United States Government