You are here

Attack Amelioration via Layered Temporal Virtualizaton ("Primer")

Award Information
Agency: Department of Defense
Branch: Air Force
Contract: FA8750-14-C-0147
Agency Tracking Number: F141-038-2299
Amount: $144,532.00
Phase: Phase I
Program: SBIR
Solicitation Topic Code: AF141-038
Solicitation Number: 2014.1
Timeline
Solicitation Year: 2014
Award Year: 2014
Award Start Date (Proposal Award Date): 2014-06-24
Award End Date (Contract End Date): 2015-03-24
Small Business Information
128 E Pine Avenue
Meridian, ID 83642-
United States
DUNS: 800427838
HUBZone Owned: No
Woman Owned: No
Socially and Economically Disadvantaged: No
Principal Investigator
 Jack Meador
 Principal
 (208) 884-2138
 jack.meador@cmlab.biz
Business Contact
 Rick Hoover
Title: Principal
Phone: (208) 884-2138
Email: rphoover@cmlab.biz
Research Institution
 Stub
Abstract

ABSTRACT: This project will investigate the feasibility of a computing appliance which uses Temporal Virtualization to help ameliorate the effects of malicious software activity. Temporal Virtualization involves the manipulation of virtual time in Type-2 (software) virtual clients in a way that frustrates an adversary"s attempts to corrupt or break out of virtualization. An attack model is assumed where the detection of malicious software in one client can be used to signal ahead to another that a"future"attack is pending. This allows the second client to respond against the attack before it (virtually) begins; demonstrating a prescience of malicious activity that ultimately frustrates attempts to disrupt or escape virtualization. When combined with nested virtualization layers and effective response policy, this becomes a superior approach for fighting through attacks while minimizing service loss. BENEFIT: This work addresses a very important part of fighting through the attack: how to respond. It augments the notion of nested virtualization with features that support the development of a nested response policy that minimize the effectiveness of an attack. The proposed approach is significant because virtual time manipulation will enhance the ability to react effectively when an attempt to break out of a virtual domain is detected.

* Information listed above is at the time of submission. *

US Flag An Official Website of the United States Government