Abstract:In this proposal we outline the infrastructure for automating the partitioning/mapping of code snippets and data at the binary level in hardware-assisted software protection solutions. All techniques will be developed with the objective of achieving the highest possible security and flexibility. The… more
Abstract:In this proposal, we outline a comprehensive system enabling security measurements and interactions in distributed HPD-protected end-point systems, based on new measures of end-point trust that can be exchanged between authorized services/applications/resources. Trustedness sharing is done in such a… more
Abstract:This Small Business Innovation Research Phase II research project has as its objective the development and demonstration of a hardware-based security platform for the protection of applications and confidential data in mobile phones. The end-product components consist of an ultra-low-power security… more
Abstract:A number of software defenses exist that frustrate attempts to examine or tamper with a protected application. However, attackers are unlikely to approach the defenses head-on. One weak point is during installation and deployment of defenses. There is sort of a "who came first" game played between… more
Abstract:Global networks bring both new power and new risks. Mission-critical applications are increasingly spread over national or global networks to enable information gathering and sharing on an unprecedented scale. While this large-scale information sharing promises new efficiencies, each endpoint in a… more
Abstract:Validating software is a critical step in developing high confidence systems. Typical software development practices are not acceptable in systems where failure leads to loss of life or other high costs.
Software best practices for high confidence systems are often codified as coding rules.… more
Abstract:Development and maintenance of large software systems is a daunting task. A number of tools for simplifying the development process have been designed over the years. These include source-code browsers, debuggers, and profilers. However, despite all of these tools, software has become increasingly… more
Abstract:Hypervisors offer a virtualization platform that is cost effective and attractive from a security point of view because guest operating systems are independent of each other. However, these claims of independence must be certified before it is permitted to use a hypervisor in a security-critical… more
Abstract:Analysis, Design & Diagnostics, Inc. has put together a unique team comprised of the Woods Hole Oceanographic Institution, Adaptive Methods, Inc. and Teledyne Benthos. Under this effort the team will develop a planning tool designed so that environmental and operational mission planners can… more
Abstract:A 4-channel marine mammal detection and classification system capable of automatically detecting and classifying marine mammal vocalizations will be developed under this Phase II effort. The system will allow the operator to view marine mammal vocalizations throughout the spectrum and will include… more
Abstract:DESCRIPTION (provided by applicant): Image reconstruction in x-ray computer tomography (CT) scanners lags far behind the data acquisition. For example a whole-body scan using the latest 64-slice medical CT scanners, with sub-millimeter slice thickness, wh
ich takes about 10 seconds to acquire,… more
Abstract:The SBIR Phase II project aims to develop a software package that enables rapid image reconstruction for X-ray Micro-CT (computerized Tomography) imaging. Over the last few years, Micro-CT has become a very valuable tool in pharmaceutical and basic research. Current Micro-CT scanners have reached… more
Abstract:DESCRIPTION (provided by applicant): With the increased use of x-ray CT, the development of a market for CT screening exams, and the imaging of younger patients, there is a growing concern about the public health risk caused by the radiation dose delivered
by x-ray CT. The reduction of this dose… more
There are several categories such as “By Agency”, “By Year”, “By State” etc.
Select a checkbox within a category to refine your search results.
Each of your selections is listed in the “Narrow Search Filters” bar. You can uncheck these selections to remove them.
Search for Either Criteria
When you select multiple values within a category, the results will include values that match either of the selections.
For example, selecting “2005” and “2007” in the “By Year” category will display results that include either 2005 OR 2007 in the results.
Narrowing the Search Results
You can refine your search results across categories. To narrow down your results, select multiple values across different categories. The results will only include values that match the selections across the categories.
For example, selecting “2005” in the “By Year” category and “NASA” in the “By Agency” category will only display the results that contain both “2005” AND “NASA” in the results.