Deterministic Detection for Hijacked Program Execution

Award Information
Agency:
Department of Defense
Branch
n/a
Amount:
$149,863.00
Award Year:
2012
Program:
SBIR
Phase:
Phase I
Contract:
N00014-12-M-0244
Award Id:
n/a
Agency Tracking Number:
O113-IA5-4049
Solicitation Year:
2011
Solicitation Topic Code:
OSD11-IA5
Solicitation Number:
2011.3
Small Business Information
1245 LYONS RD, STE G, Dayton, OH, -
Hubzone Owned:
N
Minority Owned:
Y
Woman Owned:
N
Duns:
031764616
Principal Investigator:
Nicholas Kovach
Developer II
(937) 281-0782
n.kovach@edaptive.com
Business Contact:
Praveen Chawla
CEO
(937) 281-0790
p.chawla@edaptive.com
Research Institution:
Stub




Abstract
Our proposal specifically addresses the stated requirements of the solicitation; we will develop software and system protection tools for monitoring the execution of untrusted software in large complex networks. This includes attacks which may be present in software applications used within the DoD (e.g. buffer overflow, code injection, rootkit patching, etc.). The proposed EDAptive DeforcE solution builds on previous Edaptive Computing, Inc. (ECI) knowledge and technology itself innovative to provide detection and reporting of software based attacks. The resulting capabilities will result in innovative compiler technology, along with a software monitor, to determine if anomalous behavior (i.e. an attack) has occurred in the execution of the application.

* information listed above is at the time of submission.

Agency Micro-sites


SBA logo

Department of Agriculture logo

Department of Commerce logo

Department of Defense logo

Department of Education logo

Department of Energy logo

Department of Health and Human Services logo

Department of Homeland Security logo

Department of Transportation logo

Enviromental Protection Agency logo

National Aeronautics and Space Administration logo

National Science Foundation logo
US Flag An Official Website of the United States Government