Automating Software Protection with the Random Obfuscating Compiler Version 2 (ROC2) running on Beowulf Clusters
Small Business Information
127 Washington St., Belmont, MA, 02478
Director of R&D
Director of R&D
AbstractOur Random Obfuscating Compiler2 ("ROC2") automated toolset will protect DoD HPC executables running on Beowulf clusters from reverse engineering or compromise. Preliminary DoD HPC research is often conducted on university Beowulfs, which are also used by unscreened researchers and students. The US is engaged in an arms race and must protect valuable IP. A ROC2 toolset is feasible now. Phase I demonstrated that ROC2 works on a 5-node Beowulf without performance penalty. At our August, 2005 demo, the control machine ran on a computer in Massachusetts and enabled automatic protection of executables running on a Beowulf in Maine. In Phase l we developed and partially prototyped a defense against root. Our team--Fred Smith, PI and PI on a ROC1 SBIR, and Dr. George Markowsky of the UMaine Computer Science Department -has the expertise. In Phase ll we will scale up to 400-550 nodes, enhance the root defense, interview users, deliver prototypes, and test extensively, including a red team effort. Dr. Markowsky will establish a center to research potential threats and continually update ROC2. Phase II will deliver a powerful and streamlined toolset for the DoD High Performance Computing Modernization Program (HPCMP) to protect critical HPC research on university Beowulfs.
* information listed above is at the time of submission.