SBIR-STTR Award

Kernel-mode Software Protection to Prevent Piracy, Reverse Engineering, and Tampering of End-Node Applications
Award last edited on: 7/8/2010

Sponsored Program
SBIR
Awarding Agency
DOD : OSD
Total Award Amount
$841,098
Award Phase
2
Solicitation Topic Code
OSD06-IA6
Principal Investigator
Gary Grainger

Company Information

Ashton Security Laboratories LLC (AKA: ASL)

12530 Rock Ridge Road
Herndon, VA 20170
   (703) 421-9900
   jdt@ashtonlabs.com
   www.ashtonlabs.com
Location: Single
Congr. District: 11
County: Fairfax

Phase I

Contract Number: ----------
Start Date: ----    Completed: ----
Phase I year
2007
Phase I Amount
$91,210
We propose to develop a secure niche from which to run integrity management or other OS and application monitoring software on COTS PCs running popular COTS operating systems. The security of the proposed environment will have no dependency on the correct operation of the host operating system. The security model will assume that the operating system and its kernel have been compromised. The design of the secure niche will be capable of being formally modeled, proved, and evaluated under the Common Criteria at a high assurance level. Our approach is to use the Security Management Mode (SMM) that is part of every Pentium processor as the core of the mechanism, using it to implement a new security ring (call it Ring -1) below the Ring 0 kernel. Various payloads can then be run in this niche, such as integrity monitors and virus checkers, to protect the OS and user applications and data from corruption. The secure niche protects the payload so the payload can protect the system.

Keywords:
Integrity Monitoring, Intrustion Detection, Operating System Protection, Sub-Kernel, Ring -1, Security Management Mode (Smm)

Phase II

Contract Number: ----------
Start Date: ----    Completed: ----
Phase II year
2008
Phase II Amount
$749,888
We propose to further the development of a secure integrity monitor for PCs. Its feasibility was determined in Phase I. It uses the System Management Mode of the Intel Pentium architecture (including compatible chips from AMD) to protect itself from tampering or interference by malicious software that is running in kernel mode, such as root-kits. It uses a statistical approach to malicious software detection that is asymmetrical in that it requires more effort from attackers to counter all of its potential protection mechanisms that it is required to actually execute.

Keywords:
Integrity Monitor, System Management Mode (Smm), Root-Kit, Intrusion Detection, Operating System Protection