SBIR-STTR Award

HPC Obfuscation and Security Toolkit (HOST)
Award last edited on: 1/26/2018

Sponsored Program
SBIR
Awarding Agency
DOE
Total Award Amount
$1,224,916
Award Phase
2
Solicitation Topic Code
03a
Principal Investigator
Robert Joyce

Company Information

Architecture Technology Corporation (AKA: Odyssey Research Associates, Inc~Architecture Technology Corporation NY~ATCorp~ATC-NY~ATC - NY)

1610 Trumansburg Road
Ithaca, NY 14850
   (607) 257-1975
   info@atcorp.com
   www.atcorp.com
Location: Multiple
Congr. District: 23
County: Tompkins

Phase I

Contract Number: DE-SC0017195
Start Date: 2/21/2017    Completed: 2/20/2018
Phase I year
2017
Phase I Amount
$224,952
General purpose large-scale High Performance Computing (HPC) clusters are finding wider adoption with increased demand for computing power among business, utility, financial, education, scientific, and critical national infrastructure systems. With more general usage, the need for increased availability has brought forth increased cyber security concerns—especially between concurrent users of the same HPC cluster who may not wish to share their data/algorithms, corporate secrets, or other sensitive information. General statement of how this problem or situation is being addressed: The problem will be addressed by developing a software system for obfuscating the operations of an HPC cluster, protecting data confidentiality and integrity. By obfuscating HPC codes, status information, user data, and network configuration, sensitive operations can be hidden from unprivileged users without imparting significant computational overhead. Statement of what will be done in Phase I: For phase I, we propose the development of HOST, a software service that combines with the plugin API of HPC management systems, such as SLURM, to provide code obfuscation, system level obfuscation, and improved monitoring for privileged users. HOST is an installable software product that provides a framework for obfuscation and a command line interface for user interaction. After completing the Phase I prototype, users will be capable of entering commands similar to those included in SLURM, but with added functionality for obfuscating the system’s behavior in response to those commands. Commercial applications or other

Benefits:
In addition to providing improved software assurances, both in the form of data confidentiality and computational integrity, HOST will also promote better resource utilization. A major concern with shared HPC platforms is that data integrity can be breached by unrelated users. HOST will save time and money for users by preventing data breaches and ultimately improving computational integrity. At the same time, we anticipate that computational overhead will be greatly improved over traditional encryption techniques. By ensuring security for unrelated users, it becomes possible for system maintainers to increase availability and improve resource utilization.

Phase II

Contract Number: DE-SC0017195
Start Date: 5/21/2018    Completed: 5/20/2020
Phase II year
2018
Phase II Amount
$999,964
Large-scale computing systems, formerly relegated to research institutions and behind closed doors, are now often used for critical infrastructure modeling and control. These high-performance computing systems are frequently geographically distributed and exposed to the Internet, making them attractive resources for misuse and cyberattack. As high-performance computing systems grow even more popular and more widely distributed, simply firewalling and isolating a system is no longer feasible as a solution.