Deterministic Detection for Hijacked Program Execution
Small Business Information
1245 LYONS RD, STE G, Dayton, OH, -
AbstractOur proposal specifically addresses the stated requirements of the solicitation; we will develop software and system protection tools for monitoring the execution of untrusted software in large complex networks. This includes attacks which may be present in software applications used within the DoD (e.g. buffer overflow, code injection, rootkit patching, etc.). The proposed EDAptive DeforcE solution builds on previous Edaptive Computing, Inc. (ECI) knowledge and technology itself innovative to provide detection and reporting of software based attacks. The resulting capabilities will result in innovative compiler technology, along with a software monitor, to determine if anomalous behavior (i.e. an attack) has occurred in the execution of the application.
* information listed above is at the time of submission.