Zephyr Software LLC

Basic Information

2040 Tremont Rd
Charlottesville, VA, 22911-8653

http://www.zephyr-software.com

Company Profile

n/a

Additional Details

Field Value
DUNS: 830972647
Hubzone Owned: N
Socially and Economically Disadvantaged: N
Woman Owned: N
Number of Employees: 2


  1. ESP: Embedded Systems Protection

    Amount: $1,100,748.00

    An existing binary static analyzer will be enhanced to protect embedded systems binaries by rewriting the binaries with security instrumentation to enforce four separate defenses against various explo ...

    SBIR Phase II 2015 Department of DefenseDefense Advanced Research Projects AgencyDepartment of Defense
  2. Preventing Program Hijacking via Static and Dynamic Analyses

    Amount: $863,602.00

    To hijack the execution of a program, an attacker must overwrite the value of a return address or a function pointer (broadly defined). To prevent program hijacking, our product will provide a layered ...

    SBIR Phase II 2014 Department of DefenseNavyDepartment of Defense
  3. Binary Program Optimization

    Amount: $75,151.00

    An existing binary static analyzer, STARS (STatic Analyzer for Reliability and Security) will be enhanced to perform compiler optimizations that are most relevant to highly layered and modular code. S ...

    SBIR Phase I 2013 Department of DefenseNavyDepartment of Defense
  4. ESP: Embedded Systems Protection

    Amount: $96,710.00

    An existing binary static analyzer will be enhanced to provide both exploit protections and anti-memory-tampering defenses via static rewriting rules. A binary static analyzer will accept the original ...

    SBIR Phase I 2013 Defense Advanced Research Projects AgencyDepartment of DefenseDepartment of Defense
  5. Preventing Program Hijacking via Static and Dynamic Analyses

    Amount: $131,237.00

    Control flow hijacking occurs when an attacker overwrites a control-flow data item (e.g. return address or function pointer) to take control of the execution of a program. We propose to detect and pre ...

    SBIR Phase I 2012 Department of DefenseNavyDepartment of Defense
  6. Secure Operation of Untrusted SDR Systems

    Amount: $69,876.00

    SDR (Software Defined Radio) systems will often be required to accept a software component that is untrusted, e.g. from a military coalition partner. The proposed research will perform not only memory ...

    SBIR Phase I 2011 Department of DefenseNavyDepartment of Defense
  7. Customized Application Security Via Process Virtualization

    Amount: $98,595.00

    ABSTRACT: Military and other software systems often face the need to accept untrusted software components into the system. The proposed research will enable secure integration of untrusted software c ...

    STTR Phase I 2011 Air ForceDepartment of DefenseDepartment of Defense
  8. Virtualization and Static Analysis to Detect Memory Overwriting Vulnerabilities

    Amount: $96,155.00

    Memory overwriting vulnerabilities (buffer overflow, format string, double free, integer overflow, etc.) continue to plague commercial and government software, providing avenues for attackers to gain ...

    SBIR Phase I 2009 Department of Homeland Security
  9. Lightweight Virtualization to Detect, React, and Adapt to Cyber Attacks

    Amount: $96,156.00

    Many software defenses against reverse engineering, piracy, and tampering rely on disabling the software when such attacks are detected. The proposed research makes innovative use of proces-level soft ...

    SBIR Phase I 2009 Department of DefenseAir ForceDepartment of Defense

Agency Micro-sites

US Flag An Official Website of the United States Government