SBIR-STTR Award

Security through Component-based Isolation Framework (SCIF)
Award last edited on: 6/14/2015

Sponsored Program
STTR
Awarding Agency
DOD : AF
Total Award Amount
$840,200
Award Phase
2
Solicitation Topic Code
AF10-BT18
Principal Investigator
Curtis Wu

Company Information

Charles River Analytics Inc

625 Mount Auburn Street
Cambridge, MA 02138
   (617) 491-3474
   info@cra.com
   www.cra.com

Research Institution

----------

Phase I

Contract Number: ----------
Start Date: ----    Completed: ----
Phase I year
2011
Phase I Amount
$99,946
Networked PCs are critical to the success of data-based missions, and the complex software they execute is both the source of their power and their prime area of vulnerability. Applications and services are often composed of multiple software components developed by different vendors or open source communities, who may in turn incorporate components developed by another tier of vendors. To help minimize the damage of an exploit, data must not be allowed to flow freely between all components running on a system. To improve application security and minimize the damage done by malicious or faulty code, we propose a component-based isolation framework. Mutable protection domains will provide the basis for a lightweight component-based isolation framework. We will apply a user-level sandboxing scheme to separate application-specific services and components from those of the underlying kernel. To optimize performance, we will also investigate approaches to isolate components accessing shared hardware to provide CPU and IO protection. Finally, we will design techniques to proactively detect components at risk of fault, so they can be highlighted for extra attention.

Benefit:
We expect the full-scope framework to have immediate and tangible benefit for a number of military computing systems. In particular, the framework will help networked systems fight through cyber attacks. The technologies developed under this effort will enhance the effectiveness of existing secure OS tools by incorporating the component-based isolation techniques.

Keywords:
Software Fault Isolation, User-Level Sandboxing, Fault Prediction, Cyber Defense

Phase II

Contract Number: ----------
Start Date: ----    Completed: ----
Phase II year
2012
Phase II Amount
$740,254
Networked PCs are critical to the success of data-driven missions, and the complex software they execute is both the source of their power and their primary vulnerability. Applications and services are often composed of multiple software components developed by different vendors or open source communities—any of which may introduce a vulnerability. To help minimize the damage of potential exploitation of such vulnerabilities, data must not be allowed to flow freely between all components running on a system. To improve application security and minimize damage done by malicious or faulty code, we propose to design and develop a multikernel OS, which will provide a hardware-based memory isolation scheme that allows fine-grained control over data flow between OS components. Our lightweight virtualization solution provides component isolation and fault recovery without the overhead associated with more traditional heavyweight virtualization approaches. The multikernel will distribute components among sandboxed kernels with an efficient heuristic algorithm that balances isolation and performance. Faulty sandboxed kernels will be dynamically recoverable without a full system reboot. Finally, we will design techniques to proactively detect components at risk of fault, so they can be highlighted for extra attention.

Benefit:
We expect the full-scope multikernel OS to have immediate and tangible benefit for a number of military computing systems. In particular, the framework will help networked systems fight through cyber attacks. The technologies developed under this effort will enhance the effectiveness of existing secure OS tools by incorporating the component-based isolation techniques. The multikernel OS will also be the basis for a secure and predictable next-generation OS with commercial and military applications.

Keywords:
Fault Isolation, Fault Prediction, Fault Recovery, Multikernel, Multicore, Cyber Defense