SBIR-STTR Award

Run Time Tools` Output Integration Framework
Award last edited on: 4/22/2014

Sponsored Program
SBIR
Awarding Agency
DHS
Total Award Amount
$844,129
Award Phase
2
Solicitation Topic Code
H-SB09.2-004
Principal Investigator
Ed Seidewitz

Company Information

Data Access Technologies Inc (AKA: Model Driven Solutions~MDA~DAT)

8605 Westwood Center Drive Suite 505
Vienna, VA 22182
   (703) 992-9105
   info@modeldriven.com
   www.modeldriven.com
Location: Multiple
Congr. District: 11
County: Fairfax

Phase I

Contract Number: ----------
Start Date: ----    Completed: ----
Phase I year
2009
Phase I Amount
$94,141
This proposal addresses the key issue in the normalization of software assurance information: how to integrate the vulnerability findings reported by multiple vulnerability detection tools. The normalization will provide normalized, consistent reporting on type of identified weakness (alignment with CWE) as well as normalized, consistent reporting on location and trace of identified weakness within code (source or binary). The project will build upon and extend the results of several recent government-funded programs in the area of software assurance. Once completed the project will develop an open-standard-based Run Time Tool Output Integration Framework (TOIF) and deliver the integration of several existing open source vulnerability detection tools into this framework. This will mitigate one of the major practical gaps with today`s software assurance tools: the non overlapping findings of the current tools and will enable cross examining the vulnerabilities reported by different tools, something that is currently very dependant on human verification and therefore very laborious. This would enable using multiple vulnerability detection tools in a coordinated manner. The anticipated results will be made available to the community (as open source) of tools vendors, leading to further improvements in vulnerability detection tools through normalization of their outputs, better alignment with existing standards, and better exchanges of software assurance information.

Phase II

Contract Number: ----------
Start Date: ----    Completed: ----
Phase II year
2010
Phase II Amount
$749,988
This proposal addresses the key issue in the normalization of software assurance information, how to integrate the vulnerability findings reported by multiple vulnerability detection tools. The normalization will provide normalized, consistent reporting on type of identified weakness (alignment with CWE) as well as normalized, consistent reporting on location and trace of identified weakness within code (source or binary). The project will build upon and extend the results of several recent government-funded programs in the area of software assurance. The phase II R&D effort will utilize phase I deliverables and accomplishments to complete the project and deliver (1) an open-standard-based Run Time Tool Output Integration Framework (TOIF) and (2) the integration of several existing open source vulnerability detection tools into this framework. This will mitigate one of the major practical gaps with today`s software assurance tools, the non-overlapping findings of the current tools and will enable cross-examining the vulnerabilities reported by different tools, something that is currently very dependant on human verification and therefore very laborious. This would enable using multiple vulnerability detection tools in a coordinated manner. The anticipated results will be made available to the community (as open source) of tools vendors, leading to further improvements in vulnerability detection tools through normalization of their outputs, better alignment with existing standards, and better exchanges of software assurance information.