SBIR-STTR Award

Gyrus: Preventing Sensitive Information and Malicious Traffic from Leaving Computers
Award last edited on: 2/1/2013

Sponsored Program
SBIR
Awarding Agency
DOD : OSD
Total Award Amount
$849,128
Award Phase
2
Solicitation Topic Code
OSD10-IA4
Principal Investigator
Wenke Lee

Company Information

Security Axioms Inc

4545 Powers Ferry Road Nw
Atlanta, GA 30327
   (404) 808-5172
   wenke.lee@gmail.com
   www.security-axioms.com/
Location: Single
Congr. District: 11
County: Fulton

Phase I

Contract Number: ----------
Start Date: ----    Completed: ----
Phase I year
2011
Phase I Amount
$99,982
Existing security technologies such as firewalls, anti-virus, intrusion detection and prevention systems, and botnet detection systems fail or have a significant capability gap in detecting and stopping malicious traffic, particularly where it is disguise

Keywords:
Data Exfiltration, Malicious Traffic, Virtual Machine Introspection, Secure-In-Vm Monitoring, Semantic Gap, Semantic Probe, Thin Hypervisor

Phase II

Contract Number: ----------
Start Date: ----    Completed: ----
Phase II year
2012
Phase II Amount
$749,146
Existing security technologies fail or have a significant capability gap in detecting and stopping malicious traffic. Based on the new insight that traffic by malware is not directly initiated by user activities on a computer, Security Axioms has developed a new solution called Gyrus. Based on virtual machine monitoring techniques, Gyrus uses hardware events combined with memory analysis to authorize outgoing application traffic only if it was intended by the user. The Phase I project studied and demonstrated the feasibility of Gyrus with a demo system where Gyrus ensures that a CAC card can only be used by the user to connect to the intended web sites. The main objective of Phase II is to develop a prototype host-based security product. Security Axioms will tackle several technical challenges. First, to make Gyrus more useful, we will add and improve support for email, web browsing, and messaging applications, and develop techniques to facilitate the addition of support for new applications. Second, to make Gyrus more usable, we will develop a dynamic virtualization architecture where the degree of virtualization is adjusted based on the current need of security monitoring, so that performance overhead is incurred according to the level of security provided.

Keywords:
Data Exfiltration, Malicious Traffic, Virtual Machine Introspection, Secure-In-Vm Monitoring, Semantic Gap,