Preventing Program Hijacking via Static and Dynamic Analyses

Award Information
Agency: Department of Defense
Branch: Office of the Secretary of Defense
Contract: N00014-14-C-0197
Agency Tracking Number: O2-1379
Amount: $863,602.00
Phase: Phase II
Program: SBIR
Solicitation Topic Code: OSD11-IA5
Solicitation Number: 2011.3
Timeline
Solicitation Year: 2011
Award Year: 2014
Award Start Date (Proposal Award Date): 2014-05-23
Award End Date (Contract End Date): 2016-05-23
Small Business Information
2040 Tremont Rd, Charlottesville, VA, 22911-8653
DUNS: 000000000
HUBZone Owned: N
Woman Owned: N
Socially and Economically Disadvantaged: N
Principal Investigator
 Clark Coleman
 (434) 284-3002
 clc@zephyr-software.com
Business Contact
 Jack Davidson
Phone: (434) 242-4280
Email: jwd@zephyr-software.com
Research Institution
N/A
Abstract
To hijack the execution of a program, an attacker must overwrite the value of a return address or a function pointer (broadly defined). To prevent program hijacking, our product will provide a layered defense of these two targets, including deterministic and randomization defenses, with the ability in many cases to continue execution after a hijacking attempt is prevented. Our product toolkit includes static analysis of the program binary to be protected (no source code required) and dynamic monitoring using virtual machine technology after deployment. The randomization defense can be used to provide artificial software diversity.

* Information listed above is at the time of submission. *

Agency Micro-sites

SBA logo
Department of Agriculture logo
Department of Commerce logo
Department of Defense logo
Department of Education logo
Department of Energy logo
Department of Health and Human Services logo
Department of Homeland Security logo
Department of Transportation logo
Environmental Protection Agency logo
National Aeronautics and Space Administration logo
National Science Foundation logo
US Flag An Official Website of the United States Government