You are here
2LRESEARCH
UEI: N/A
# of Employees: 2
HUBZone Owned: No
Socially and Economically Disadvantaged: Yes
Woman Owned: No
Award Charts
Award Listing
-
Relational Pattern Analysis Tool for Legacy Conversion
Amount: $100,000.00This project develops a technology to automate the interpretation and understanding of complex trees of source code and related artifacts for conversion to run on newer hardware, operating systems and ...
SBIRPhase I2008Department of Defense Missile Defense Agency -
Intelligent Agents for Improved Ground-Test Operations
Amount: $100,000.00The proposal outlines a research program for developing a novel soft-computing technology composed of an Artificial Immune System and Bayesian Belief Networks for monitoring, knowledge and information ...
STTRPhase I2006National Aeronautics and Space Administration -
Binary-Level Malicious Code Pattern Detection Technology
Amount: $749,999.00This effort is based on the outcome of a successful Phase I project that demonstrated the feasibility of generating logic pattern-based, OS-platform-independent, signatures for malicious program logic ...
SBIRPhase II2005Department of Defense Missile Defense Agency -
Anti-Malcious Source Scanner
Amount: $100,000.002LR proposes to develop a malicious source code scanner that can flag sections of potentially `bad' source code that is vulnerable to exploitation or may contain latent malicious content. This effort ...
SBIRPhase I2005Department of Defense Missile Defense Agency -
Malicious Logic Behavior Monitoring and Control System
Amount: $100,000.00This SBIR effort proposes to develop tools that enable a capability in tamper proof source code. The proposed methods will protect against several modes of attack including malicious programmers, sour ...
SBIRPhase I2005Department of Defense Air Force -
Binary-Level Malicious Code Pattern Detection Technology
Amount: $100,000.00This effort develops automatic detection of malicious binary code based on syntax-independent logical control flow patterns. Control flow patterns yield specific detectable signatures that can be ext ...
SBIRPhase I2004Department of Defense Missile Defense Agency -
Malicious Binary Code Automated Response, Forensics and Immunity- Tools and Methods
Amount: $100,000.00This effort will develop a capability for automated modification of binary code based on canonical algorithm patterns of control flows. Since these methods are based on control flow, they are OS and ...
SBIRPhase I2004Department of Defense Missile Defense Agency