A Framework for Software Reverse Engineering Protection

Award Information
Agency:
Department of Defense
Amount:
$69,577.00
Program:
SBIR
Contract:
N00178-02-C-3066
Solitcitation Year:
N/A
Solicitation Number:
N/A
Branch:
Navy
Award Year:
2002
Phase:
Phase I
Agency Tracking Number:
N02-100-01
Solicitation Topic Code:
N/A
Small Business Information
Architecture Technology Corp.
9971 Valley View Road, Eden Prairie, MN, 55344
Hubzone Owned:
N
Woman Owned:
N
Socially and Economically Disadvantaged:
N
Duns:
052062833
Principal Investigator
 Kevin Millikin
 R&D Engineer
 (952) 829-5864
 kmillikin@atcorp.com
Business Contact
 Kenneth Thurber
Title: President
Phone: (952) 829-5864
Email: kthurber@atcorp.com
Research Institution
N/A
Abstract
"Military software systems are vulnerable to Information Warfare attacks. If an enemy can gain knowledge of the software, then the software and the systems it runs on can be attacked, either directly or indirectly. One method the enemy may employ isreverse engineering, attempting to recover the program's source code from the binary executable file. Software obfuscation is a defensive information warfare technique that tries to make the cost of reverse engineering prohibitive to the enemy.Obfuscation can also protect software from theft and subsequent reuse. In addition, a software obfuscation capability can enable active offensive information warfare and protection from attacks such as viruses and worms. Architecture TechnologyCorporation proposes the research and development of technologies and products necessary for software obfuscation technology for the Navy. There are three products of this research and development effort. A predictive obfuscation model will allow Navysoftware engineers to anticipate the cost and effectiveness of obfuscating transformations, and to intelligently design obfuscating solutions. Second, a catalog of transformations known from scientific literature and engineering folklore as well asseveral novel transformations will be produced. Finally, a prototype implementation will validate the model and serve as a proof of the concept of object to object obfuscation, as well as a prototype to an automati

* information listed above is at the time of submission.

Agency Micro-sites

US Flag An Official Website of the United States Government