Malicious Logic Behavior Monitoring and Control System
Department of Defense
Agency Tracking Number:
Solicitation Topic Code:
Small Business Information
190 Green Valley Road, Owens Crossroads, AL, 35763
Socially and Economically Disadvantaged:
AbstractThis SBIR effort proposes to develop tools that enable a capability in tamper proof source code. The proposed methods will protect against several modes of attack including malicious programmers, source code viruses, and system worms. The tools and techniques proposed are based on the fundamental logical structure of the application under protection and offer dynamic monitor and control of runtime behavior. This effort develops unique logic-based signatures of source code using syntax-independent control logic flow patterns. Control flow patterns yield specific detectable signatures that can be extracted from source code as well as binary code. Because they are based on functional control flow, the signatures are also related to functional behavior, thus, any modifications to the code that alter behavior also alter its logic signature - a source code will have the same signature as its binary despite the compiler used. These concepts apply across computer languages, operating systems and development tools to independently detect and enforce the logic and behavior integrity of code from source thru binary. The result of successful SBIR development will significantly reduce critical vulnerabilities associated with the development and reuse of mission critical source code assets within defense systems.
* information listed above is at the time of submission.