You are here

Dynamically Obfuscating Virtual Execution Engine (DOVE)

Award Information
Agency: Department of Defense
Branch: Army
Contract: W31P4Q-06-C-0479
Agency Tracking Number: A052-150-0346
Amount: $730,000.00
Phase: Phase II
Program: SBIR
Solicitation Topic Code: A05-150
Solicitation Number: 2005.2
Timeline
Solicitation Year: 2005
Award Year: 2006
Award Start Date (Proposal Award Date): 2006-09-06
Award End Date (Contract End Date): 2008-09-30
Small Business Information
4515 Seton Center Parkway, Suite 320
Austin, TX 78759
United States
DUNS: 158034665
HUBZone Owned: No
Woman Owned: Yes
Socially and Economically Disadvantaged: No
Principal Investigator
 Braxton Thomason
 Technical Lead
 (512) 342-0010
 bthomason@21technologies.com
Business Contact
 Darrin Taylor
Title: COO
Phone: (512) 342-0010
Email: dtaylorz@21technologies.com
Research Institution
N/A
Abstract

The United States Army is increasingly dependent on weapons platforms that rely on commercial off the shelf (COTS) hardware coupled with mission critical embedded software. Autonomous weapons platforms such as unmanned aerial reconnaissance vehicles and bomb/mine defusing robots are very effective at assisting the warfighter in countering asymmetric threats. This gives U.S. forces strategic and tactical advantages. Increased autonomy increases the risk of capture and subsequent reverse-engineering. The use of COTS hardware components makes the software much more susceptible to reverse-engineering than customized hardware. Reverse engineering a weapons platform enables an adversary to compromise the platform’s mission and cost soldiers’ lives. Anti-tamper (AT) and anti-reverse engineering (ARE) methods focus on sufficiently delaying or making it economically infeasible for the adversary; it is well understood that is impossible to entirely prevent re-engineering. The Dynamically Obfuscating Virtual Execution Environment (DOVE) will severely inhibit the adversary’s ability to reverse engineer or tamper with weapons software in a timely manner by applying dynamic obfuscation. The dynamic obfuscation in DOVE will undermine and invalidate the software cracker’s most basic assumptions about code execution and make it extremely difficult to reverse engineer or tamper with code.

* Information listed above is at the time of submission. *

US Flag An Official Website of the United States Government