You are here

Active Defense Against Code Injection Attacks

Award Information
Agency: Department of Defense
Branch: Air Force
Contract: FA8650-10-M-1761
Agency Tracking Number: O092-IA1-1015
Amount: $99,620.00
Phase: Phase I
Program: SBIR
Solicitation Topic Code: OSD09-IA1
Solicitation Number: 2009.2
Timeline
Solicitation Year: 2009
Award Year: 2009
Award Start Date (Proposal Award Date): 2009-11-16
Award End Date (Contract End Date): 2010-08-16
Small Business Information
421 SW Sixth Avenue Suite 300
Portland, OR 97204
United States
DUNS: 098009918
HUBZone Owned: No
Woman Owned: No
Socially and Economically Disadvantaged: No
Principal Investigator
 Louis Testa
 Project Lead
 (503) 626-6616
 louis@galois.com
Business Contact
 Jodee LeRoux
Title: Contracts
Phone: (503) 626-6616
Email: jodee@galois.com
Research Institution
N/A
Abstract

The threat posed by remote cyber attacks has grown every year, with nation state attacks being the hardest to detect and blunt. A common cyber attack method against remote systems is the code injection attack, where the attacker finds flaws in a remote application then forces the application to execute injected code. Code injection attacks can give the attacker unlimited access to the attacked system and thereby an entryway into a secure network. An attacker will often follow this attack by leaving software that will allow for unlimited future access. Code injection attacks can be very difficult to detect, as they often use program flaws not known to the security community. These attacks continue to be developed to get around current defense mechanisms: signature detection and spectrum analysis. A more general approach of identifying and catching these attacks in progress is needed. We propose investigating a code injection attack detector based on abstract interpretation which would catch new types of attacks before they are publicly known. This detector would be combined with an active defense mechanism that could be configured to block the attacks while allowing a security officer to gather information about the attackers'' methods.

* Information listed above is at the time of submission. *

US Flag An Official Website of the United States Government