USA flag logo/image

An Official Website of the United States Government

Company Information:

Company Name:
Zephyr Software LLC
Address:
2040 Tremont Rd
Charlottesville, VA 22911-8653
Phone:
(434) 242-4280
URL:
EIN:
270338717
DUNS:
830972647
Number of Employees:
2
Woman-Owned?:
No
Minority-Owned?:
No
HUBZone-Owned?:
No

Commercialization:

Has been acquired/merged with?:
N/A
Has had Spin-off?:
N/A
Has Had IPO?:
N/A
Year of IPO:
N/A
Has Patents?:
N/A
Number of Patents:
N/A
Total Sales to Date $:
$ 0.00
Total Investment to Date $
$ 0.00
POC Title:
N/A
POC Name:
N/A
POC Phone:
N/A
POC Email:
N/A
Narrative:
N/A

Award Totals:

Program/Phase Award Amount ($) Number of Awards
SBIR Phase I $565,285.00 6
SBIR Phase II $863,602.00 1
STTR Phase I $98,595.00 1

Award List:

Virtualization and Static Analysis to Detect Memory Overwriting Vulnerabilities

Award Year / Program / Phase:
2009 / SBIR / Phase I
Award Amount:
$96,155.00
Agency:
DHS
Principal Investigator:
Clark L. Coleman – (434) 284-3002
Abstract:
Memory overwriting vulnerabilities (buffer overflow, format string, double free, integer overflow, etc.) continue to plague commercial and government software, providing avenues for attackers to gain unauthorized control over computer systems. Testing tools are needed that will find vulnerabilities… More

Lightweight Virtualization to Detect, React, and Adapt to Cyber Attacks

Award Year / Program / Phase:
2009 / SBIR / Phase I
Award Amount:
$96,156.00
Agency / Branch:
DOD / OSD
Principal Investigator:
Clark L. Coleman, Research Scientist
Abstract:
Many software defenses against reverse engineering, piracy, and tampering rely on disabling the software when such attacks are detected. The proposed research makes innovative use of proces-level software virtualization on a per-application basis to defeat such attacks without disabling the… More

Customized Application Security Via Process Virtualization

Award Year / Program / Phase:
2011 / STTR / Phase I
Award Amount:
$98,595.00
Agency / Branch:
DOD / USAF
Principal Investigator:
Clark L. Coleman, Research Scientist – (434) 284-3002
Research Institution:
University of Virginia
RI Contact:
John C. Knight
Abstract:
ABSTRACT: Military and other software systems often face the need to accept untrusted software components into the system. The proposed research will enable secure integration of untrusted software components by (1) isolating these components using application-level (per-process) virtualization;… More

Secure Operation of Untrusted SDR Systems

Award Year / Program / Phase:
2011 / SBIR / Phase I
Award Amount:
$69,876.00
Agency:
DOD
Principal Investigator:
Clark Coleman, Research Scientist – (434) 284-3002
Abstract:
SDR (Software Defined Radio) systems will often be required to accept a software component that is untrusted, e.g. from a military coalition partner. The proposed research will perform not only memory address space isolation, but other high level security monitoring services, for these untrusted… More

Preventing Program Hijacking via Static and Dynamic Analyses

Award Year / Program / Phase:
2012 / SBIR / Phase I
Award Amount:
$131,237.00
Agency:
DOD
Principal Investigator:
Clark L. Coleman, Research Scientist – (434) 284-3002
Abstract:
Control flow hijacking occurs when an attacker overwrites a control-flow data item (e.g. return address or function pointer) to take control of the execution of a program. We propose to detect and prevent hijacking by using a low-overhead per-process dynamic run-time virtualization monitor, called… More

Binary Program Optimization

Award Year / Program / Phase:
2013 / SBIR / Phase I
Award Amount:
$75,151.00
Agency:
DOD
Principal Investigator:
Clark Coleman, Research Scientist – (434) 284-3002
Abstract:
An existing binary static analyzer, STARS (STatic Analyzer for Reliability and Security) will be enhanced to perform compiler optimizations that are most relevant to highly layered and modular code. STARS will emit binary rewriting rules that will be used by a binary rewriter to produce an optimized… More

ESP: Embedded Systems Protection

Award Year / Program / Phase:
2013 / SBIR / Phase I
Award Amount:
$96,710.00
Agency / Branch:
DOD / DARPA
Principal Investigator:
Clark L. Coleman, Research Scientist – (434) 284-3002
Abstract:
An existing binary static analyzer will be enhanced to provide both exploit protections and anti-memory-tampering defenses via static rewriting rules. A binary static analyzer will accept the original binary and the rewriting rules and produce a new, protected binary. Formal theorem-proving methods… More

Preventing Program Hijacking via Static and Dynamic Analyses

Award Year / Program / Phase:
2014 / SBIR / Phase II
Award Amount:
$863,602.00
Agency / Branch:
DOD / OSD
Principal Investigator:
Clark L. Coleman, Research Scientist – (434) 284-3002
Abstract:
To hijack the execution of a program, an attacker must overwrite the value of a return address or a function pointer (broadly defined). To prevent program hijacking, our product will provide a layered defense of these two targets, including deterministic and randomization defenses, with the ability… More