Countermeasures to Covert Access Methods to ReduceAttack Susceptibility and Ensure Trust

Award Information
Agency:
Department of Defense
Branch
Air Force
Amount:
$749,913.00
Award Year:
2011
Program:
SBIR
Phase:
Phase II
Contract:
FA8650-11-C-1049
Agency Tracking Number:
O2-1017
Solicitation Year:
2009
Solicitation Topic Code:
OSD09-IA2
Solicitation Number:
2009.2
Small Business Information
Edaptive Computing, Inc
1245 LYONS RD, STE G, Dayton, OH, -
Hubzone Owned:
N
Socially and Economically Disadvantaged:
N
Woman Owned:
N
Duns:
031764616
Principal Investigator:
Jorge Sanchez
Developer I
(937) 281-0783
j.sanchez@edaptive.com
Business Contact:
Praveen Chawla
President
(937) 281-0790
p.chawla@edaptive.com
Research Institution:
Stub




Abstract
Sophisticated methods for compromising computer systems have continuously shown their ability to defeat current operating system and network defenses. Processes such as the BIOS, hardware device drivers, and COTS hardware from a non-trusted supply chain have been identified to include malware or Trojan horse applications. These subversive programs provide attackers with gaping holes from which they can pirate software, exfiltrate data, execute processes, alter critical information, or control network end-nodes. The biggest problem with many attacks of this magnitude is that they lie in areas of the computer system which are not easily accessible through software-only approaches. As such, the goal of our proposed technology is to provide protection at the hardware level through a combination of software and hardware systems that will monitor low-level access to critical system devices including hard disks, memory, and peripherals.

* information listed above is at the time of submission.

Agency Micro-sites

US Flag An Official Website of the United States Government