Computer Network Operations (CNO) for Ground-based Midcourse Defense (GMD)

Period of Performance: 05/25/2006 - 05/26/2008

$1.3MM

Phase 2 SBIR

Recipient Firm

Reifer Consultants, Inc.
P.O. Box 4046
Torrance, CA 90510
Principal Investigator

Abstract

This Phase II effort will develop the tools, techniques and experimental evidence needed to demonstrate to potential users that RCI's active forensics technology can be effectively used to detect, deter and defeat reverse engineering and tampering attacks against weapons systems applications software. As part of the effort, unique signatures for common tools used by exploiters to mount tampering attacks (debuggers, decompilers, disassemblers, etc.) will be captured via honeypots, downloaded and extracted. Once validated, the resulting signatures will be cataloged in a library and used as part of RCI s software sneak circuit protection methodology. Using signatures from the library, the RCI team will develop effective counter-measures (waste time, crash the system, etc.) that can be mechanized operationally via its sneak circuit toolset. As part of the effort, RCI will demonstrate how typical exploitation attempts can be foiled using its anti-tamper testbed.