You are here
ZEPHYR SOFTWARE LLC
http://www.zephyr-software.com
UEI: ZYYMRLSCHBY3
# of Employees: 4
HUBZone Owned: No
Socially and Economically Disadvantaged: No
Woman Owned: No
Award Charts
Award Listing
-
Dependable DevOps: Building Reliable and Secure Software via Automated Bug Finding
Amount: $74,942.00Despite advances, modern software development methods still result in code being deployed with severe errors. There are many reasons why, including growing software complexity and required rapid devel ...
SBIRPhase I2019Department of Defense Air Force -
ESP: Embedded Systems Protection
Amount: $1,100,748.00An existing binary static analyzer will be enhanced to protect embedded systems binaries by rewriting the binaries with security instrumentation to enforce four separate defenses against various explo ...
SBIRPhase II2014Department of Defense Defense Advanced Research Projects Agency -
Preventing Program Hijacking via Static and Dynamic Analyses
Amount: $863,602.00To hijack the execution of a program, an attacker must overwrite the value of a return address or a function pointer (broadly defined). To prevent program hijacking, our product will provide a layered ...
SBIRPhase II2014Department of Defense Office of the Secretary of Defense -
Binary Program Optimization
Amount: $75,151.00An existing binary static analyzer, STARS (STatic Analyzer for Reliability and Security) will be enhanced to perform compiler optimizations that are most relevant to highly layered and modular code. S ...
SBIRPhase I2013Department of Defense Navy -
ESP: Embedded Systems Protection
Amount: $96,710.00An existing binary static analyzer will be enhanced to provide both exploit protections and anti-memory-tampering defenses via static rewriting rules. A binary static analyzer will accept the original ...
SBIRPhase I2013Department of Defense Defense Advanced Research Projects Agency -
Preventing Program Hijacking via Static and Dynamic Analyses
Amount: $131,237.00Control flow hijacking occurs when an attacker overwrites a control-flow data item (e.g. return address or function pointer) to take control of the execution of a program. We propose to detect and pre ...
SBIRPhase I2012Department of Defense Navy -
Customized Application Security Via Process Virtualization
Amount: $98,595.00ABSTRACT: Military and other software systems often face the need to accept untrusted software components into the system. The proposed research will enable secure integration of untrusted software c ...
STTRPhase I2011Department of Defense Air Force -
Secure Operation of Untrusted SDR Systems
Amount: $69,876.00SDR (Software Defined Radio) systems will often be required to accept a software component that is untrusted, e.g. from a military coalition partner. The proposed research will perform not only memory ...
SBIRPhase I2011Department of Defense Navy -
Virtualization and Static Analysis to Detect Memory Overwriting Vulnerabilities
Amount: $96,155.00Memory overwriting vulnerabilities (buffer overflow, format string, double free, integer overflow, etc.) continue to plague commercial and government software, providing avenues for attackers to gain ...
SBIRPhase I2009Department of Homeland Security -
Lightweight Virtualization to Detect, React, and Adapt to Cyber Attacks
Amount: $96,156.00Many software defenses against reverse engineering, piracy, and tampering rely on disabling the software when such attacks are detected. The proposed research makes innovative use of proces-level soft ...
SBIRPhase I2009Department of Defense Air Force