Countermeasures to Covert Access Methods to Reduce Attack Susceptibility and Ensure Trust

Period of Performance: 11/09/2009 - 08/13/2010


Phase 1 SBIR

Recipient Firm

Edaptive Computing, Inc.
1245 Lyons Road Array
Dayton, OH 45458
Principal Investigator


Our proposal specifically addresses the stated requirements of the solicitation; we will develop software and data protection tools to detect and provide countermeasures to sophisticated covert access methods on computer systems. This includes hardware-based attacks which are currently undetectable through software-only approaches. The proposed EDAptive® TrEMBlE solution builds on previous EDAptive Computing, Inc (ECI) knowledge and technology itself innovative to provide detection of hardware-assisted attacks, otherwise undetectable through software only approaches. The resulting capabilities will result in a customized PCIe device and co-processor which will monitor traffic between non-trusted devices, detect anomalies, and create decoys for maliciously coded firmware attacks.