PrintPrint

Awards

Topic Information Award/Contract Number Proposal Information Company Performance
Period
Award/Contract
Value
Abstract

H-SB05.2-004
HARDWARE-ASSISTED SYSTEM SECURITY MONITOR

NBCHC060020 0521195
(FY05.2 Phase I)
Autopilot - A High Assurance Host Monitor

Komoku, Inc.
9601 Baltimore Ave, Suite A-1
College Park, MD 20740-1350

12/15/2005
to
06/30/2006
$99,832.00

One of the fundamental goals of computer security is to ensure the integrity of system resources. Because all user applications rely on the integrity of the kernel and core system utilities, the compromise of any one part of the system can result in a complete lack of reliability in the system as a whole. Particularly in the case of commodity operating systems, the ability to place assurance on the numerous and complex parts of the system is exceedingly difficult. The most important pieces of this complex system reside in the core of the kernel itself. While a variety of tools and architectures have been developed for the protection of commodity systems, all have a fundamental flaw - they rely on some portion of kernel correctness to remain trustworthy themselves. In this effort, we will review hardware virtualization and Intel's Active Management Technology to determine if they provide the same level of capability and assurance as an add-in board. Based on our analysis, we will select one of the technologies to port the Copilot software base to provide a low cost and high assurance hardware platform for host (kernel) monitoring.

H-SB05.2-004
HARDWARE-ASSISTED SYSTEM SECURITY MONITOR

NBCHC070044 0522005
(FY05.2 Phase II)
AutoPilot: A high assurance virtualized security monitor

Komoku, Inc.
9601 Baltimore Ave, Suite A-1
College Park, MD 20740-1350

03/10/2007
to
03/09/2008
$745,488.00

The effectiveness of any critical infrastructure relies on its resilience to malicious modification and service disruption, as well as its ability to reconstitute itself after and during attacks. The successful completion of the work proposed here will provide a high assurance attack detection and reconstitution capability that is based on hardware, but without the deployment and cost of a custom add-in board. The end result will be a significantly better protected infrastructure.