Topic Information Award/Contract Number Proposal Information Company Performance

LMR-P25 and LTE Mission Critical Push to Talk Interface Service

70RSAT19C00000013 FY18.1-H-SB018.1-005-0005-II
(FY18.1 Phase II)
LMR-P25 and LTE Mission Critical Push to Talk Interface Service

Catalyst Communications Technologies Inc.
2107-D Graves Mill Road
Forest, VA 24551-4293


In Phase I, Catalyst proved the feasibility of an Interworking solution for LTE Mission Critical Push-to-Talk (MCPTT) and Land Mobile Radio (LMR) systems that meets the requirements of Public Safety as documented in the National Public Safety Telecommunications Council Public Safety LMR Interoperability with LTE Mission Critical Push to Talk report. In Phase II, we will combine innovations created through this study with our field proven interoperability products to deliver a software-based prototype LMR to LTE MCPTT product solution that we will commercialize in Phase III. To support the transition to LTE MCPTT we will offer a scalable architecture that leverages the Radio over IP technology that we have perfected over the last twenty years. Our solution will focus on the Project 25 standard interfaces ISSI, DFSI, and CAI and also support other standards-based and proprietary LMR systems. The Catalyst team brings decades of industry experience delivering interoperability solutions, ensuring the successful completion of this SBIR program for DHS. The result for Public Safety and other critical communicators will be the ability to effectively communicate between MCPTT and LMR devices enabling a smoother transition to LTE at a lower cost. We have identified a multi-million-dollar market for the resulting product that would allow each Public Safety agency to independently route MCPTT voice between its existing LMR system, FirstNetTM, other LTE networks, and other LMR systems.

Automated & Scalable Analysis of Mobile & IoT Device Firmware

70RSAT19C00000007 FY18.1-H-SB018.1-008-0009-II
(FY18.1 Phase II)
SAFARI: Scalable Analysis of Firmware for AndRoid and IOS

Kryptowire, LLC
5352 Brandon Ridge Way
FAIRFAX, VA 22032-3282


To address the supply chain threats that stem from vulnerable or malicious software distributed through firmware on mobile and IoT devices via binary firmware images, we propose a scalable, comprehensive, and automated framework to detect firmware-borne threats, both malicious and (un)intentionally insecure, present in Android and iOS devices. We use a workflow encompassing three analysis techniques: forced-path execution, static analysis, and dynamic analysis across multiple software modules and applications. The novelty of our approach is based on its capability to provide analysis of software across different vendors, operating system versions, and applications as opposed to single application testing that has been our aim for previous work on mobile application testing. Being able to identify and trace data and control flow between different applications, the operating system, and back-end services for Android and iOS devices (mobile and IoT) is necessary to uncover code vulnerabilities and threats in the presence of software bundles such as the firmware images. In addition, recognizing that no single binary code analysis approach is without its shortcomings, so we address and complement the shortcomings of each individual approach, by employing a more comprehensive analysis using a diversity of analysis techniques. We detail a feasibility study for the design and implementation of, a novel system that will automatically identify, trigger, and analyze vulnerabilities in firmware. Our goal is to uncover any code vulnerabilities and design errors and their effects by efficiently enumerating and null-fuzzing all statically and dynamically accessible software components on the firmware.