Dynamically Obfuscating Virtual Execution Engine (DOVE)

Award Information
Agency: Department of Defense
Branch: Army
Contract: W31P4Q-06-C-0479
Agency Tracking Number: A052-150-0346
Amount: $730,000.00
Phase: Phase II
Program: SBIR
Awards Year: 2006
Solitcitation Year: 2005
Solitcitation Topic Code: A05-150
Solitcitation Number: 2005.2
Small Business Information
21ST CENTURY TECHNOLOGIES, INC.
4515 Seton Center Parkway, Suite 320, Austin, TX, 78759
Duns: 158034665
Hubzone Owned: N
Woman Owned: Y
Socially and Economically Disadvantaged: N
Principal Investigator
 Braxton Thomason
 Technical Lead
 (512) 342-0010
 bthomason@21technologies.com
Business Contact
 Darrin Taylor
Title: COO
Phone: (512) 342-0010
Email: dtaylorz@21technologies.com
Research Institution
N/A
Abstract
The United States Army is increasingly dependent on weapons platforms that rely on commercial off the shelf (COTS) hardware coupled with mission critical embedded software. Autonomous weapons platforms such as unmanned aerial reconnaissance vehicles and bomb/mine defusing robots are very effective at assisting the warfighter in countering asymmetric threats. This gives U.S. forces strategic and tactical advantages. Increased autonomy increases the risk of capture and subsequent reverse-engineering. The use of COTS hardware components makes the software much more susceptible to reverse-engineering than customized hardware. Reverse engineering a weapons platform enables an adversary to compromise the platform’s mission and cost soldiers’ lives. Anti-tamper (AT) and anti-reverse engineering (ARE) methods focus on sufficiently delaying or making it economically infeasible for the adversary; it is well understood that is impossible to entirely prevent re-engineering. The Dynamically Obfuscating Virtual Execution Environment (DOVE) will severely inhibit the adversary’s ability to reverse engineer or tamper with weapons software in a timely manner by applying dynamic obfuscation. The dynamic obfuscation in DOVE will undermine and invalidate the software cracker’s most basic assumptions about code execution and make it extremely difficult to reverse engineer or tamper with code.

* information listed above is at the time of submission.

Agency Micro-sites

US Flag An Official Website of the United States Government