SBIR-STTR Award

Penetration Analysis Tools
Award last edited on: 4/17/2002

Sponsored Program
SBIR
Awarding Agency
DOD : DARPA
Total Award Amount
$695,352
Award Phase
2
Solicitation Topic Code
SB961-010
Principal Investigator
Virgil D Gligor

Company Information

V D G Inc

5023 Frew Street Suite 4A
Pittsburgh, PA 15213
   (412) 621-1071
   N/A
   N/A
Location: Single
Congr. District: 18
County: Allegheny

Phase I

Contract Number: ----------
Start Date: ----    Completed: ----
Phase I year
1996
Phase I Amount
$98,978
Penetration of trusted software represents a set of illicit means of exploiting design and implementation flaws and/or operational errors to cause system security, integrity, and denial-of-service breaches. Penetration of trusted software presents a serious risk to both distributed systems and networks, both in the commercial and defense sectors. The overall objective of this project is to implement an extensible, automated tool for penetration analysis of trusted software written in C, and to perform experiments with the tool on selected trusted systems to establish the usefulness of tool-based penetration analysis. The tool will enable the identification of flaws in trusted code that could lead to system penetration, and will generate sufficient information to help produce real penetration scenarios and countermeasures. The penetration analysis tool, when fully implemented, will provide a significant measure of confidence in the integrity and security of computer system and network software. It is envisioned that the method and tool developed in this project will be used for analyzing the source code of distributed systems platforms, network protocols, and high-assurance systems under B2-A1, or equivalent, evaluations. In general, the penetration analysis method and tool developed in this project could be used by both software producers and commercial security certification services.

Phase II

Contract Number: ----------
Start Date: ----    Completed: ----
Phase II year
1997
Phase II Amount
$596,374
The overall objective of this project is to implement an extensible, automate tool for penetration analysis of trusted software written in C, and to develop an educational and training package that would enhance the analyst's ability to apply the penetration tool to real trusted-system software. An additional objective is to perform experiments with the tool on selected trusted-system code to demonstrate the usefulness of tool-based penetration analysis. The tool will enable the identification of flaws in trusted code that could lead to system penetration, and will generate sufficient information to help produce real penetration scenarios and countermeasures. The Phase II of this project includes the implementation and testing of the (1) penetration tool engine, which consists of the primitive-flow generator, flow integrator, condition set consistency checker, and flaw-detection modules, (2) LAPRES (LAnguage for Penetration REsistance Specifications) compiler, which translates the analyst's penetration resistance specification in the format required by the flaw-detection modules, (3) GPA (Graphical Penetration Analysis) tool, which enables the analyst to browse through and display integrated flow paths of trusted code and their security checks, to specify penetration-resistance conditions in LAPRES, and to perform flaw-detection tasks on actual trusted code. Phase II also includes the development and implementation of an educational and training package for the use of the penetration analysis tools, and two demonstrations on the application of the tools to trusted code of significant size.