SBIR-STTR Award

Vulnerability Analysis for Systems Security Technology (VASST)
Award last edited on: 3/4/2024

Sponsored Program
SBIR
Awarding Agency
DOD : MDA
Total Award Amount
$1,087,940
Award Phase
2
Solicitation Topic Code
MDA07-039
Principal Investigator
Kelly Parker

Company Information

Noetic Strategies Inc

1300 Meridian Street N Suite 3000-
Huntsville, AL 35901
   (256) 489-4921
   info@noeticstrategies.com
   www.noeticstrategies.com
Location: Single
Congr. District: 05
County: Madison

Phase I

Contract Number: HQ0006-08-C-7850
Start Date: 2/13/2008    Completed: 8/13/2009
Phase I year
2008
Phase I Amount
$99,918
In the real world of mission critical applications and systems that must not fail, there is an ever increasing need for effective security monitoring systems that are also designed not to impede the normal operation and use of heterogeneous distributed networks. The IAMS technology proposed here will be a next generation, distributed network security platform, that spreads itself across the enterprise creating a redundant security system that is highly resistant to attack. Due to the distributed nature, IAMS will make both global decisions as well as local decisions, even when a section is cut off from the rest of the network. It has the ability to communicate in a manner that is suitable for use on diverse mobile devices, such as cell phones and PDA’s. It is deterministic, remotely reconfigurable, uses industry standards for communication and is an autonomic computing platform.

Keywords:
Information Assurance, Cybersecurity, Network Defense, Virtualization Technology, Event Management

Phase II

Contract Number: HQ0147-18-C-7005
Start Date: 9/16/2018    Completed: 9/5/2020
Phase II year
2018
Phase II Amount
$988,022
VASST seeks to secure large systems, overcoming challenges arising from size and scale, vulnerability analysis, and cyber and physical integration. It defines vulnerabilities at the component level and translates their effects up to the system level. It does this in a two stage process, with the first stage seeing the evaluation of cyber vulnerabilities to produce model effects which are in turn evaluated in models to produce validated first order system effects. These physical effects are then propagated through a Systems Security Engineering (SSE) Model to produce second and third order system effects and determine the mission level impacts. Approved for Public Release | 16-MDA-8695 (1 June 16)