SBIR-STTR Award

Application of Novel Malware Identification Techniques with Machine Learning to Industrial Controls Networks (MIMICS)
Award last edited on: 5/10/22

Sponsored Program
STTR
Awarding Agency
DOD : AF
Total Award Amount
$49,965
Award Phase
1
Solicitation Topic Code
AF20C-TCSO1
Principal Investigator
Kevin Klawon

Company Information

New Dawn Labs LLC

102 South Main Street
Union, OH 45320
   (203) 675-5644
   N/A
   www.newdawnlabs.io

Research Institution

UDRI

Phase I

Contract Number: FA8649-21-P-0721
Start Date: 2/5/21    Completed: 5/8/21
Phase I year
2021
Phase I Amount
$49,965
New Dawn Labs, working with the University of Dayton Research Institute (UDRI) and the Centauri Corp. proposes a cutting edge malware detection solution that is trained to identify threats based on known characteristics of existing malware for Industrial Controls Systems (ICS) and SCADA systems. Based on UDRI’s novel and published approach to malware classification and identification, and Centauri’s Integrated Civil Engineer’s Environment (ICEE) used to monitor and aggregate data on the Air Force Civil Engineering network (CE COINE), New Dawn is proposing an integrated platform for Malware Identification using Machine learning on the ICS (MIMICS) on the CE COINE network. ICS are deployed in manufacturing and warehousing facilities around the globe. They are usually under-supported and maintained by individuals that only understand how to install and configure these systems for their vendor and their equipment. The community at-large does not understand software/hardware, nor do they consider vulnerabilities, threats, and bad actors. The MIMICS platform offers a vendor-agnostic approach to identifying malware signatures on IT systems. It does this based on artificial intelligence that examines signatures of services and software running on an ICS computer. It does this by looking at the assembled code of the executable and performing pattern recognition on the programmed behavior of that software. This novel approach can be leveraged against many forms of malware, and used as a platform for new defense techniques in cyber protec

Phase II

Contract Number: ----------
Start Date: 00/00/00    Completed: 00/00/00
Phase II year
----
Phase II Amount
----