Arxan Research, Inc.

3000 Kent Avenue, Purdue Technology Center
West Lafayette, IN 47906
http://www.arxan.com
48 Employees

SBIR Award Summary

Total Number of Awards 9
Total Value of Awards $2.99MM
First Award Date 08/11/03
Most Recent Award Date 07/23/08

Key Personnel

Last Name Name Awards Contact
Rice Dr. John Rice 3 Message
Bryant Mr. Eric D. Bryant 3 Message
Morissette Mr. Paul Morissette 1 Message
Wroblewski Mr. W.R. Wroblewski 2 Message

9 Awards Won

Phase 2 SBIR

Agency: Office of the Secretary of Defense
Topic: OSD05-A10
Budget: 07/23/08 - 07/23/10

This Phase II proposal extends the technique developed during Phase I for protecting CPI into a commercially viable and generally applicable source-to-source transformation engine. In addition, we expand the Phase I approach to support high-performance secure computation through careful division of tasks, between a slower secured processor, and...

Phase 2 SBIR

Agency: Missile Defense Agency
Topic: MDA05-020
Budget: 06/28/07 - 06/28/09

In this Phase II research effort Arxan intends to build a practical and commercially feasible product - a reconfigurable-hardware-based protection-system integration product. That product EnforIT-H shall meet certain design goals. The first goal is to fill all unused FPGA space. The second goal is to insert protection into an application afte...

Phase 1 SBIR

Agency: Office of the Secretary of Defense
Topic: OSD06-I13
Budget: 01/30/07 - 01/30/08

The Security to the Edge strategy identifies a growth area in the development technologies to enable Trusting the Edge; particularly, two research areas are specified: i) hardening an edge node against physical attack; and ii) facilitating the ability of an edge node to monitor and communicate the state of its integrity. The thrust of this prop...

Phase 1 SBIR

Agency: Office of the Secretary of Defense
Topic: OSD05-A10
Budget: 07/21/06 - 07/21/07

For this project, we will research novel data-splitting techniques that can be used on COTS hardware to achieve similar effects as a specialized security processor, without relying upon expensive cryptographic operations. This is achieved through the technique of data splitting, and the use of k copies of the same moderately secure COTS hardwar...

Phase 1 SBIR

Agency: Missile Defense Agency
Topic: MDA05-020
Budget: 05/16/06 - 11/30/06

Tampering with or reverse engineering mission critical software is a very serious and real threat to modern weapons systems. Any protection which significantly degrades the performance of the weapons system is not practical. The proposed system will perform AT-related computations on a reconfigurable multicore processor to allow important secu...

Phase 1 SBIR

Agency: National Science Foundation
Topic: 2006
Budget: 01/01/06 - 12/31/06

This Small Business Innovation Research Phase I research project advances the state of software licensing and distribution through the development of a secure software rental/subscription system. The proposed technology builds upon existing Digital Rights Management (DRM) and Electronic License Management (ELM) principles, as well as Arxan's sta...

Phase 1 SBIR

Agency: Office of the Secretary of Defense
Topic: OSD04-SP3
Budget: 03/28/05 - 03/28/06

Protecting national security software against unauthorized distribution and exploitation is necessary for the protection of intellectual property (IP) and secrets in our nation. Modern software attack and analysis tools have become, along with their users, more skilled at analyzing and modifying programs. Currently, technologies that protect, ...

Phase 2 SBIR

Agency: Office of the Secretary of Defense
Topic: OSD03-001
Budget: 08/27/04 - 08/27/06

Given two closely related pieces of software X and Y, where Y differs from X through a number of small but important (from a security point of view) modifications that were done to Y, the "diff" attack consists of comparing X and Y so as to pinpoint the fragments of code in which they differ. The differences between X and Y could include, among...

Phase 1 SBIR

Agency: Office of the Secretary of Defense
Topic: OSD03-001
Budget: 08/11/03 - 05/11/04

Given two closely related pieces of software X and Y, where Y differs from X through a number of small but important (from a security point of view) modifications that were done to Y, the "diff" attack consists of comparing X and Y so as to pinpoint the fragments of code in which they differ. The differences between X and Y could include, among...