DOD information security aims to boost embedded computing cyber defense against computer hackers

WRIGHT-PATTERSON AFB, Ohio, 11 Oct., 2009. The Pentagon's Defense Research & Engineering section is continuing an initiative to plug holes in U.S. military cyber defense by concealing installation and deployment of information security measures -- a notable vulnerability to computer hackers.

WRIGHT-PATTERSON AFB, Ohio, 11 Oct., 2009. The Pentagon's Defense Research & Engineering section is continuing an initiative to plug holes in U.S. military cyber defense by concealing the installation and deployment of information security measures -- a notable vulnerability to enemy computer hackers.

The U.S. Air Force Research Laboratory at Wright-Patterson Air Force Base, Ohio, is awarding a $750,000 small business innovative research (SBIR) contract to Grammatech Inc. in Ithaca, N.Y., (award FA865010C1752) for a data security program called Covert Loading and Execution of Software Protections to Reduce Adversarial Detection.

Several software defenses exist for cyber security that are intended to frustrate enemy hacker attempts to examine or tamper with protected military software applications in embedded computing, Grammatech officials explain.

Still, software attackers are unlikely to approach the defenses head-on, Grammatech officials explain. One weak point is during installation and deployment of defenses. Without special military information security measures in place, hackers can watch as information defenses are set up, and learn how they can defeat military cyber security measures.

The Air Force is awarding this SBIR contract to Grammatech on behalf of the U.S. Office Of The Secretary Of Defense's (OSD) deputy director of defense research & engineering, who reports to the Pentagon's deputy under secretary of defense for science & technology.

Grammatech data security experts are pursuing a technique that protects the loading phase of sensitive software applications not only by denying hackers access to the system, but also by separating sensitive software from the operating system to prevent attack before information security measures are in place.

For more information contact Grammatech online at www.grammatech.com.

Subscribe

-- Posted by John Keller, jkeller@pennwell.com. www.milaero.com.

Follow me on Twitter

More in Computers