SBIR-STTR Award

Securing Applications by Limiting Exposure
Award last edited on: 4/1/2019

Sponsored Program
STTR
Awarding Agency
DOD : AF
Total Award Amount
$99,242
Award Phase
1
Solicitation Topic Code
AF10-BT18
Principal Investigator
Jon C Haass

Company Information

SoftKrypt LLC

3029 Dollar Mark Way Suite A
Prescott, AZ 86305
   (928) 717-9800
   jon@softkrypt.com
   www.blackencode.com

Research Institution

----------

Phase I

Contract Number: ----------
Start Date: ----    Completed: ----
Phase I year
2011
Phase I Amount
$99,242
This STTR Phase I project addresses exploit attempts being mounted against applications code and modules with vulnerabilities that need to be protected. The team's strategy is to “blacken” or isolate applications and the inter, and intra communications paths between them and the lnternet using innovative algorithms developed by Embry-Riddle Aeronautical University (ERAU). We plan to prove these algorithms work, scale and have utility during our Phase I effort by mounting a series of selective experiments. We will validate the potential of our Phase l concept by conducting experiments aimed at demonstrating scalability and utility of our blackening approach in a realistic operational setting. We will develop a requirements and architecture specification for a prototype toolset that will be used to automate the algorithms based on the results of an automation study that we will also conduct during Phase l. We will develop and use this toolset during Phase ll to prove the worth of our approach on a pilot project. Finally, we will also conduct a market survey to scope the commercialization potential of products and services we envision can be marketed once the concept is proven.

Benefit:
New class of protection of digital assets against cyber threats that can apply to data, application modules, and systems incorporating software applications providing flexible control in operational use against tampering, piracy, duplication or subversion.

Keywords:
Code Transformation, Anti-Tamper, Malicious Code Mitigation, Limitation Of Threat Exposure, Secure Application Execution In In-Secure Environments

Phase II

Contract Number: ----------
Start Date: ----    Completed: ----
Phase II year
----
Phase II Amount
----