Securing Applications by Limiting Exposure

Award Information
Agency:
Department of Defense
Branch
Air Force
Amount:
$99,242.00
Award Year:
2011
Program:
STTR
Phase:
Phase I
Contract:
FA8750-11-C-0141
Award Id:
n/a
Agency Tracking Number:
F10B-T18-0309
Solicitation Year:
2010
Solicitation Topic Code:
AF10-BT18
Solicitation Number:
2010.B
Small Business Information
2581 Park Country Drive, Prescott, AZ, 86305-
Hubzone Owned:
N
Minority Owned:
N
Woman Owned:
N
Duns:
965605582
Principal Investigator:
Jon Haass
CEO / VP Development
(650) 867-5407
Jon@SoftKrypt.com
Business Contact:
Vinay Sharma
Chief Operating Officer
(310) 993-5211
Vinay@SoftKrypt.com
Research Institute:
Embry-Riddle Aeronautical Universit
Christina Frederick-Recascino
3200 N. Willow Creek Road
Prescott, AZ, 86301-
(386) 226-7037
Nonprofit college or university
Abstract
ABSTRACT: This STTR Phase I project addresses exploit attempts being mounted against applications code and modules with vulnerabilities that need to be protected. The team's strategy is to"blacken"or isolate applications and the inter, and intra communications paths between them and the lnternet using innovative algorithms developed by Embry-Riddle Aeronautical University (ERAU). We plan to prove these algorithms work, scale and have utility during our Phase I effort by mounting a series of selective experiments. We will validate the potential of our Phase l concept by conducting experiments aimed at demonstrating scalability and utility of our blackening approach in a realistic operational setting. We will develop a requirements and architecture specification for a prototype toolset that will be used to automate the algorithms based on the results of an automation study that we will also conduct during Phase l. We will develop and use this toolset during Phase ll to prove the worth of our approach on a pilot project. Finally, we will also conduct a market survey to scope the commercialization potential of products and services we envision can be marketed once the concept is proven. BENEFIT: New class of protection of digital assets against cyber threats that can apply to data, application modules, and systems incorporating software applications providing flexible control in operational use against tampering, piracy, duplication or subversion.

* information listed above is at the time of submission.

Agency Micro-sites


SBA logo

Department of Agriculture logo

Department of Commerce logo

Department of Defense logo

Department of Education logo

Department of Energy logo

Department of Health and Human Services logo

Department of Homeland Security logo

Department of Transportation logo

Enviromental Protection Agency logo

National Aeronautics and Space Administration logo

National Science Foundation logo
US Flag An Official Website of the United States Government