SBIR-STTR Award

Trustworthy Execution of Security-Sensitive Code on Un-trusted Systems
Award last edited on: 7/8/2010

Sponsored Program
STTR
Awarding Agency
DOD : Army
Total Award Amount
$849,936
Award Phase
2
Solicitation Topic Code
A08-T005
Principal Investigator
Virgil D Gligor

Company Information

V D G Inc

5023 Frew Street Suite 4A
Pittsburgh, PA 15213
   (412) 621-1071
   N/A
   N/A

Research Institution

----------

Phase I

Contract Number: ----------
Start Date: ----    Completed: ----
Phase I year
2008
Phase I Amount
$99,977
Computing devices are routinely targeted by a wide variety of malware. The presence of exploitable vulnerabilities in computing device software, and the easy availability of know-how and tools for construction of exploit code has made it easy for attackers to introduce malware into computing devices by exploiting software. Since computing devices are routinely used for security-sensitive applications like electronic commerce, command and control systems, and critical infrastructure monitoring and control, malware present on computing devices can potentially compromise sensitive user information, and the privacy and safety of users. To use computing devices with confidence, users thus need an assurance that the software they use on their computing devices executes untampered by malware. Three classes of security-sensitive software best illustrate user-verifiable secure execution in the presence of malware on commercially available platforms: (1) secure remote login, (2) secure signing of critical data, and (3) secure execution of non-circumventable intrusion detection tools. In this STTR, we propose to investigate a technique for user-verifiable execution of security-sensitive code on untrusted platforms in the presence of malware. We also propose to illustrate the use of our technique through the three classes of security applications mentioned above.

Keywords:
User-Verifiable Secure Execution In The Presence Of Malware On Commercially Available Platforms, Deployment On Commercially Available Platforms, Resistant To Malware And Malic

Phase II

Contract Number: ----------
Start Date: ----    Completed: ----
Phase II year
2010
Phase II Amount
$749,959
We propose to design, analyze, implement, and evaluate a system that enables user-verifiable execution of code on untrusted computer systems in the presence of malware. Our system is based on a secure hypervisor that provides and enforces strong security