SBIR-STTR Award

LOQI: Leveraging Optimization using Quantum-devices for Internet-security
Award last edited on: 9/22/21

Sponsored Program
STTR
Awarding Agency
DOD : AF
Total Award Amount
$147,649
Award Phase
1
Solicitation Topic Code
AF20A-T003
Principal Investigator
Wim Van Dam

Company Information

QC Ware Corp (AKA: QC Ware )

195 Page Mill Road Suite 113
Palo Alto, CA 94306
   (650) 502-1900
   info@qcware.com
   www.qcware.com

Research Institution

SRI International

Phase I

Contract Number: FA8750-20-P-1711
Start Date: 6/16/20    Completed: 11/16/20
Phase I year
2020
Phase I Amount
$147,649
The Leveraging Optimization via Quantum-devices for Internet-security (LOQI) proposal aims to demonstrate the power of hybrid (quantum/classical) optimization approaches for classes of combinatorial optimization problems that are relevant to several cyber-security settings. In Phase 1 (this proposal) we will conduct a feasibility study to develop an analytical framework and algorithms, and prototype them in simulation and software, to explore the power of such hybrid algorithms in solving combinatorial optimization problems can be represented as variations of the Multi-dimensional Knapsack Problem (MKP). One of the main objectives of LOQI is to develop variations of hybrid algorithms that can be executed in the near future on Noisy Intermediate-Scale Quantum (NISQ) devices. MKP based optimization problems have several applications in networking-security and cyber-security. Most of the applications we envision can be ed as variations of a constrained resource allocation problem that can be cast as an MKP instance. The three applications that we will focus on in this proposal are: (i) allocating micro-services in a cloud environment to maintain a certain level of quality-of-service to different jobs, especially if under a heavy load, and in the existence of potentially malicious resource-draining processes, (ii) allocating filtering and rate limiting resources locally or upstream in a network to defend distributed against denial-of-service (DDoS) attacks, and (iii) allocating network routes and forwarding rules in the routing infrastructure, e.g., in Software Defined Networking (SDN) controllers, to ensure resilience and operations in a network under attack.

Phase II

Contract Number: ----------
Start Date: 00/00/00    Completed: 00/00/00
Phase II year
----
Phase II Amount
----