You are here

Binary-Level Malicious Code Pattern Detection Technology

Award Information
Agency: Department of Defense
Branch: Missile Defense Agency
Contract: HQ0006-04-C-7013
Agency Tracking Number: B041-056-0051
Amount: $100,000.00
Phase: Phase I
Program: SBIR
Solicitation Topic Code: MDA04-056
Solicitation Number: 2004.1
Timeline
Solicitation Year: 2004
Award Year: 2004
Award Start Date (Proposal Award Date): 2004-05-25
Award End Date (Contract End Date): 2004-11-25
Small Business Information
190 Green Valley Road
Owens Crossroads, AL 35763
United States
DUNS: 142295422
HUBZone Owned: No
Woman Owned: No
Socially and Economically Disadvantaged: Yes
Principal Investigator
  Lopez
 CTO
 (256) 656-9652
 luis@hiwaay.net
Business Contact
  Lopez
Title: CEO
Phone: (256) 656-9652
Email: luis@flowlynx.com
Research Institution
N/A
Abstract

This effort develops automatic detection of malicious binary code based on syntax-independent logical control flow patterns. Control flow patterns yield specific detectable signatures that can be extracted from binary code. Because they are based on functional control flow, these signatures also discriminate the kinds of behavior a binary can perform; furthermore, these signatures are independent of where the binary originated. They are OS and language independent. This effort develops viable methods for analysis and classification of potential behaviors - malicious and otherwise - based on logical patterns found in binary code and related requirements meta-models. This effort will associate the presence of potential algorithm patterns with specific types of expected functionality. Inappropriate or unexpected functionality will be detectible and may indicate latent malicious code.

* Information listed above is at the time of submission. *

US Flag An Official Website of the United States Government