You are here

Tornado: an Automatic Source-code Obfuscator

Award Information
Agency: Department of Defense
Branch: Navy
Contract: N00178-04-C-3035
Agency Tracking Number: N02-100-01
Amount: $597,781.00
Phase: Phase II
Program: SBIR
Solicitation Topic Code: N02-100
Solicitation Number: 2002.1
Timeline
Solicitation Year: 2002
Award Year: 2004
Award Start Date (Proposal Award Date): 2004-02-11
Award End Date (Contract End Date): 2006-02-10
Small Business Information
9971 Valley View Road
Eden Prairie, MN 55344
United States
DUNS: 052062833
HUBZone Owned: No
Woman Owned: No
Socially and Economically Disadvantaged: No
Principal Investigator
 Kevin Millikin
 R&D Engineer
 (952) 829-5864
 kmillikin@atcorp.com
Business Contact
 Kenenth Thurber
Title: President
Phone: (952) 829-5864
Email: kthurber@atcorp.com
Research Institution
N/A
Abstract

A malicious reverse engineering attack is an attempt by an adversary to learn information about the behavior and implementation of software from analysis of the binary executable code. One technique to counter the threat of reverse engineering attacks is to obfuscate the software. Obfuscation is translation of a computer program so that it remains a computer program with the same functionality as the original, but is more difficult to reverse engineer. We propose Tornado, a software tool for automatic obfuscation of program source code. Tornado is able to reason about the susceptibility of software to reverse engineering. Tornado can intelligently transform software for the purposes of increasing the costs and difficulty of reverse engineering the software. Tornado is not limited to a fixed set of transformations, since it is designed to be extensible in order to cope with new types of threats. Tornado is able to account for the unique software requirements of software found in the real-time and embedded domains.

* Information listed above is at the time of submission. *

US Flag An Official Website of the United States Government