ZEPHYR SOFTWARE, LLC

Address

4826 STONY POINT RD
BARBOURSVILLE, VA, 22923-2123

http://www.zephyr-software.com

Information

DUNS: 830972647
# of Employees: 2

Ownership Information

Hubzone Owned: N
Socially and Economically Disadvantaged: N
Woman Owned: N

Award Charts




Award Listing

  1. ESP: Embedded Systems Protection

    Amount: $1,100,748.00

    An existing binary static analyzer will be enhanced to protect embedded systems binaries by rewriting the binaries with security instrumentation to enforce four separate defenses against various explo ...

    SBIRPhase II2014Department of Defense Defense Advanced Research Projects Agency
  2. Preventing Program Hijacking via Static and Dynamic Analyses

    Amount: $863,602.00

    To hijack the execution of a program, an attacker must overwrite the value of a return address or a function pointer (broadly defined). To prevent program hijacking, our product will provide a layered ...

    SBIRPhase II2014Department of Defense Office of the Secretary of Defense
  3. Binary Program Optimization

    Amount: $75,151.00

    An existing binary static analyzer, STARS (STatic Analyzer for Reliability and Security) will be enhanced to perform compiler optimizations that are most relevant to highly layered and modular code. S ...

    SBIRPhase I2013Department of Defense Navy
  4. ESP: Embedded Systems Protection

    Amount: $96,710.00

    An existing binary static analyzer will be enhanced to provide both exploit protections and anti-memory-tampering defenses via static rewriting rules. A binary static analyzer will accept the original ...

    SBIRPhase I2013Defense Advanced Research Projects Agency Department of Defense
  5. Preventing Program Hijacking via Static and Dynamic Analyses

    Amount: $131,237.00

    Control flow hijacking occurs when an attacker overwrites a control-flow data item (e.g. return address or function pointer) to take control of the execution of a program. We propose to detect and pre ...

    SBIRPhase I2012Department of Defense Navy
  6. Customized Application Security Via Process Virtualization

    Amount: $98,595.00

    ABSTRACT: Military and other software systems often face the need to accept untrusted software components into the system. The proposed research will enable secure integration of untrusted software c ...

    STTRPhase I2011Air Force Department of Defense
  7. Secure Operation of Untrusted SDR Systems

    Amount: $69,876.00

    SDR (Software Defined Radio) systems will often be required to accept a software component that is untrusted, e.g. from a military coalition partner. The proposed research will perform not only memory ...

    SBIRPhase I2011Department of Defense Navy
  8. Virtualization and Static Analysis to Detect Memory Overwriting Vulnerabilities

    Amount: $96,155.00

    Memory overwriting vulnerabilities (buffer overflow, format string, double free, integer overflow, etc.) continue to plague commercial and government software, providing avenues for attackers to gain ...

    SBIRPhase I2009Department of Homeland Security
  9. Lightweight Virtualization to Detect, React, and Adapt to Cyber Attacks

    Amount: $96,156.00

    Many software defenses against reverse engineering, piracy, and tampering rely on disabling the software when such attacks are detected. The proposed research makes innovative use of proces-level soft ...

    SBIRPhase I2009Department of Defense Air Force

Agency Micro-sites

US Flag An Official Website of the United States Government