Securing Applications by Limiting Exposure

Award Information
Agency: Department of Defense
Branch: Air Force
Contract: FA8750-11-C-0141
Agency Tracking Number: F10B-T18-0309
Amount: $99,242.00
Phase: Phase I
Program: STTR
Awards Year: 2011
Solicitation Year: 2010
Solicitation Topic Code: AF10-BT18
Solicitation Number: 2010.B
Small Business Information
2581 Park Country Drive, Prescott, AZ, 86305-
DUNS: 965605582
HUBZone Owned: N
Woman Owned: N
Socially and Economically Disadvantaged: N
Principal Investigator
 Jon Haass
 CEO / VP Development
 (650) 867-5407
Business Contact
 Vinay Sharma
Title: Chief Operating Officer
Phone: (310) 993-5211
Research Institution
 Embry-Riddle Aeronautical Universit
 Christina Frederick-Recascino
 3200 N. Willow Creek Road
Prescott, AZ, 86301-
 (386) 226-7037
 Nonprofit college or university
ABSTRACT: This STTR Phase I project addresses exploit attempts being mounted against applications code and modules with vulnerabilities that need to be protected. The team's strategy is to"blacken"or isolate applications and the inter, and intra communications paths between them and the lnternet using innovative algorithms developed by Embry-Riddle Aeronautical University (ERAU). We plan to prove these algorithms work, scale and have utility during our Phase I effort by mounting a series of selective experiments. We will validate the potential of our Phase l concept by conducting experiments aimed at demonstrating scalability and utility of our blackening approach in a realistic operational setting. We will develop a requirements and architecture specification for a prototype toolset that will be used to automate the algorithms based on the results of an automation study that we will also conduct during Phase l. We will develop and use this toolset during Phase ll to prove the worth of our approach on a pilot project. Finally, we will also conduct a market survey to scope the commercialization potential of products and services we envision can be marketed once the concept is proven. BENEFIT: New class of protection of digital assets against cyber threats that can apply to data, application modules, and systems incorporating software applications providing flexible control in operational use against tampering, piracy, duplication or subversion.

* Information listed above is at the time of submission. *

Agency Micro-sites

SBA logo
Department of Agriculture logo
Department of Commerce logo
Department of Defense logo
Department of Education logo
Department of Energy logo
Department of Health and Human Services logo
Department of Homeland Security logo
Department of Transportation logo
Environmental Protection Agency logo
National Aeronautics and Space Administration logo
National Science Foundation logo
US Flag An Official Website of the United States Government