Galois Connections, Inc.

421 SW Sixth Suite 300
Portland, OR 97204
http://www.galois.com
40 Employees

SBIR Award Summary

Total Number of Awards 24
Total Value of Awards $9.41MM
First Award Date 06/10/05
Most Recent Award Date 07/31/15

Key Personnel

Last Name Name Awards Contact
McKinney Ms. Laura McKinney 2 Message
Launchbury Dr. John Launchbury 4 Message
Hardman Mr. Dave Hardman 1
White Peter White 1
Testa Louis Testa 1
Burke David Burke 1 Message
McNamee Dylan McNamee 2 Message
Creswick Eugene Rogan Creswick 1 Message
Potoczny-Jones Michael Potoczny-Jones 1 Message
Tullsen Mark Tullsen 4 Message
Creswick Rogan Creswick 1 Message
Hurd Joe Hurd 1
Wick Adam Wick 3 Message
Hendrix Joe Hendrix 2 Message
Pike Lee Pike 1 Message
LeRoux Jodee LeRoux 1 Message

24 Awards Won

Phase 1 SBIR

Agency: Air Force
Topic: AF151-029
Budget: 07/31/15 - 04/30/16
PI: Adam Wick

ABSTRACT:Computer network defense tools are plagued with an excessive amount of information, frequently in the form of false positives. ?Rather than attempt to train automated tools to detect attack events more reliably, we propose to build upon existing 'honey-net' technologies to interfere with the reconnaissance phases of an adversa...

Phase 1 STTR

Institution: University of Pennsylvania

Agency: Air Force
Topic: AF14-AT06
Budget: 12/01/14 - 09/01/15
PI: Lee Pike

ABSTRACT: The kinds of capability advancements we anticipate include scalable support for multi-vehicle scenarios with concurrent executions, co-existence of adversarial and cooperative assets, timing and synchronization constraints, heterogeneous sets of specifications (e.g., prioritization over soft vs. hard constraints), and fault-tolerance....

Phase 2 SBIR

Agency: Navy
Topic: N131-061
Budget: 09/24/14 - 03/24/16

Modular software development helps enable application developers to quickly write sophisticated applications. However, in most instances only a small fraction of the functionality included in a particular software component is needed. Not only is there a performance cost, but the prevalence of security vulnerabilities suggests that even unused f...

Phase 2 SBIR

Agency: Office of the Secretary of Defense
Topic: OSD11-IA2
Budget: 11/21/13 - 02/14/16
PI: Adam Wick

Unmanned vehicles are becoming an increasingly valuable tool within the Department of Defense, and related technologies are beginning to appear in commercial systems. As their utilization grows, these unmanned systems will become a significant target for cyber attack. Indeed, existing Defense Department unmanned aerial vehicles (UAVs) have alrea...

Phase 2 SBIR

Agency: Office of the Secretary of Defense
Topic: OSD11-CP1
Budget: 09/26/13 - 09/26/14

It is all too common for a project to create software that is hard to maintain, inefficient, bug-ridden, late, and over-budget. Software flaws resulting from this current state of affairs are no longer an inconvenience but are the primary source of software security vulnerabilities. Motivated by a desire to increase our ability to reduce softw...

Phase 1 SBIR

Agency: Navy
Topic: N131-061
Budget: 05/15/13 - 03/07/14

Modular software development helps enable application developers to quickly write sophisticated applications. However, in most instances only a small fraction of the functionality included in a particular software components is needed. Not only is there a performance cost, but the prevalence of security vulnerabilities suggests that even unused ...

Phase 1 SBIR

Agency: Office of the Secretary of Defense
Topic: OSD11-IA2
Budget: 07/03/12 - 01/03/13
PI: Adam Wick

DoD operations and infrastructure increasingly depends on software, which makes it an attractive target for our adversaries. Not surprisingly, deception plays a central role in most cyberattacks. To better protect these critical systems, we propose to design and build an active counterdeception software protection system which we call CYCHAIR...

Phase 1 SBIR

Agency: Office of the Secretary of Defense
Topic: OSD11-CP1
Budget: 05/07/12 - 11/07/12

The so-called "software crisis" is continuing unabated. It is all too common for a software project to create software that is hard to maintain, inefficient, bug-ridden, late, and over-budget. Software flaws resulting from this current state of affairs are no longer an inconvenience but are the largest source of software security vulnerabiliti...

Phase 2 SBIR

Agency: Office of the Secretary of Defense
Topic: OSD10-IA1
Budget: 04/20/12 - 07/20/14

Many hardware trojans depend on (a) the ability of an attacker to have an accurate model of the target system and of key software used on that system and (b) identification of one or more deterministic trigger conditions with low observability (i.e., conditions that evade detection by traditional scan- or ATPG-based testing methodologies but tha...

Phase 2 SBIR

Agency: Army
Topic: A10-102
Budget: 01/26/12 - 01/23/14

We propose to build a separation kernel with stronger evidence of correctness than any current product on the market. We will do this by building on work done by Australia's National Information Communications Technology Research Center (NICTA), which includes a complete code-level formal proof of correctness of the L4.verified microkernel runni...

Load More