SBIR-STTR Award

CYRIN-NT: New Threats to Updated Cyber Training in Minutes, not Months
Award last edited on: 9/5/2023

Sponsored Program
SBIR
Awarding Agency
DOD : AF
Total Award Amount
$799,939
Award Phase
2
Solicitation Topic Code
AF203-DCSO1
Principal Investigator
Robert Joyce

Company Information

Architecture Technology Corporation (AKA: Odyssey Research Associates, Inc~Architecture Technology Corporation NY~ATCorp~ATC-NY~ATC - NY)

1610 Trumansburg Road
Ithaca, NY 14850
   (607) 257-1975
   info@atcorp.com
   www.atcorp.com
Location: Multiple
Congr. District: 23
County: Tompkins

Phase I

Contract Number: FA8649-20-P-0531
Start Date: 3/9/2020    Completed: 6/9/2020
Phase I year
2020
Phase I Amount
$49,998
ATC-NY’s CYRIN Next-Generation Cyber Range provides an effective, hands-on, remote cybersecurity training environment with accurate monitoring. CYRIN provides trainees with virtualized instances of exercises to provide a realistic and safe environment, so that attacks can be simulated without compromising the integrity of the system. At the same time, CYRIN automatically monitors each trainee’s progress through learning objectives by examining machine and network states. Traditional cyber range exercises frequently require months or more of setup, causing them to often be out of date in an accelerating threat environment. CYRIN’s sophisticated exercise authoring environment allows new exercises to be created in minutes, quickly responding to newly discovered cyber threats or adversary tactics. In this Phase I effort, we will engage with Air Force end users to bring them this rapid exercise authoring capability to lower costs and better train future cyber defenders against new threats.

Phase II

Contract Number: FA8649-21-P-0898
Start Date: 3/11/2021    Completed: 6/15/2022
Phase II year
2021
Phase II Amount
$749,941
ATC-NY’s CYRIN Cyber Training Suite provides an effective training environment with accurate monitoring. CYRIN provides trainees with virtualized instances of exercises to provide a realistic and safe environment, so that attacks can be simulated without