Deterministic Detection for Hijacked Program Execution

Award Information
Agency:
Department of Defense
Amount:
$149,863.00
Program:
SBIR
Contract:
N00014-12-M-0244
Solitcitation Year:
2011
Solicitation Number:
2011.3
Branch:
Navy
Award Year:
2012
Phase:
Phase I
Agency Tracking Number:
O113-IA5-4049
Solicitation Topic Code:
OSD11-IA5
Small Business Information
EDAptive Computing, Inc.
1245 LYONS RD, STE G, Dayton, OH, -
Hubzone Owned:
N
Woman Owned:
N
Socially and Economically Disadvantaged:
Y
Duns:
031764616
Principal Investigator
 Nicholas Kovach
 Developer II
 (937) 281-0782
 n.kovach@edaptive.com
Business Contact
 Praveen Chawla
Title: CEO
Phone: (937) 281-0790
Email: p.chawla@edaptive.com
Research Institution
 Stub
Abstract
Our proposal specifically addresses the stated requirements of the solicitation; we will develop software and system protection tools for monitoring the execution of untrusted software in large complex networks. This includes attacks which may be present in software applications used within the DoD (e.g. buffer overflow, code injection, rootkit patching, etc.). The proposed EDAptive DeforcE solution builds on previous Edaptive Computing, Inc. (ECI) knowledge and technology itself innovative to provide detection and reporting of software based attacks. The resulting capabilities will result in innovative compiler technology, along with a software monitor, to determine if anomalous behavior (i.e. an attack) has occurred in the execution of the application.

* information listed above is at the time of submission.

Agency Micro-sites

US Flag An Official Website of the United States Government