End to End Trusted Path for Embedded Devices and Applications

Award Information
Agency: Department of Defense
Branch: Air Force
Contract: FA8750-12-C-0141
Agency Tracking Number: F11B-T15-0283
Amount: $99,942.00
Phase: Phase I
Program: STTR
Awards Year: 2012
Solicitation Year: 2011
Solicitation Topic Code: AF11-BT15
Solicitation Number: 2011.B
Small Business Information
145 S. 79th St., Suite 26, Chandler, AZ, -
DUNS: 808358209
HUBZone Owned: N
Woman Owned: Y
Socially and Economically Disadvantaged: N
Principal Investigator
 Ty Lindteigen, CISSP
 Chief Information Assurance Arch.
 (480) 779-7859
Business Contact
 Darren Cummings
Title: President
Phone: (480) 203-7559
Email: darren.cummings@cummings-inc.com
Research Institution
 University of Advancing Technology
 Shelley Keating
Tempe, AZ, 85283-5283
 (480) 650-5481
 Nonprofit college or university
ABSTRACT: Smartphones are powerful computing devices that manipulate, store and transmit sensitive data and are becoming increasingly popular for malware attacks as a result. In order to use them for military purposes, a mesh of security techniques are needed in order to contain sensitive data and prevent it from leaving the device in an unapproved manner. Data separation primarily relies on address spaces defined by the operating system and enforced by the MMU of the processor, as well as permissions applied to data stored in files. Writing a new kernel in a secured development environment, or virtualizing the kernel and device drivers to run under a hypervisor, is the most direct way to increase the strength of data separation. However, it has technical limitations, it requires a handset-specific software solution, and it requires support of the handset manufacturer to build a custom system image. Rather than try to isolate all applications from each other, our solution is to isolate just the secure applications. Applying the proposed advanced platform integrity mechanisms along with our secure data transformation for storage and transmission provides a complete solution against the adverse effects of intentional malware or accidental mishaps. BENEFIT: Applying the advanced platform integrity techniques and secure data transformation methods described in this proposal would provide the framework for data protection, integrity, isolation, and authentication for secure applications running on mobile platforms. It ties together a number of both standard and novel security techniques in an easy to use, scalable, and trustworthy manner that has yet to be seen for an enterprise security model. Whether the enterprise is commercial, government, or military, secure communication among them is made possible through disparate networks providers and complex network topologies. The software-only solution can be quickly installed and provisioned for use, remotely updated and managed, as well as remotely uninstalled and wiped clean. The key component of continuous auditing and monitoring of the platform provides the requisite integrity we need to robustly counteract today"s adversarial conditions.

* Information listed above is at the time of submission. *

Agency Micro-sites

SBA logo
Department of Agriculture logo
Department of Commerce logo
Department of Defense logo
Department of Education logo
Department of Energy logo
Department of Health and Human Services logo
Department of Homeland Security logo
Department of Transportation logo
Environmental Protection Agency logo
National Aeronautics and Space Administration logo
National Science Foundation logo
US Flag An Official Website of the United States Government