
Protocol Feature Identification and RemovalAward last edited on: 2/19/2023
Sponsored Program
STTRAwarding Agency
DOD : NavyTotal Award Amount
$1,224,988Award Phase
2Solicitation Topic Code
N18A-T018Principal Investigator
Pete RobinsonCompany Information
P&J Robinson Corporation
11245 West Bernardo Court Suite 102
San Diego, CA 92029
San Diego, CA 92029
(619) 243-0961 |
srobinson@pjrcorp.com |
www.pjrcorp.com |
Research Institution
University of Michigan
Phase I
Contract Number: N68335-18-C-0392Start Date: 6/4/2018 Completed: 12/4/2018
Phase I year
2018Phase I Amount
$224,993Benefit:
A successful Phase I will produce a limited proof-of-concept application to demonstrate that: a) it is feasible to develop such a tool into a product that will associate protocol features to its implementation/code within the protocol software and perform code transformation to remove undesired features; and b) the level of effort to mature demonstrated concepts into more hardened product ready for use by the Navy. Phase I will provide the foundation for developing a fully functioning software toolset for identifying and tagging protocol features, allowing power users to selectively remove unwanted features and their corresponding code. Being able to remove unwanted features without needing the cooperation of the developer is a tremendous advantage and drastically helps improve the security posture of such systems. As a result, expected transition of these tools could extend to a wide range of government programs interested in improving the security and performance parameters of their software environments. Enterprise IT Management departments would also welcome the removal of unnecessary protocol features for both security and speed.
Keywords:
Communications Protocol, Communications Protocol, Protocol Vulnerability, Feature removal, Software Feature Identification, Binary Static Analysis
Phase II
Contract Number: N68335-19-C-0633Start Date: 8/12/2019 Completed: 8/19/2023
Phase II year
2019Phase II Amount
$999,995Benefit:
A successful Phase II will produce a proof-of-concept application to demonstrate that: a) it is feasible to developa product that will associate protocol features to its implementation/code within the protocol software and perform code transformation to remove undesired features; and b) mature demonstrated Phase I concepts into more hardened product ready for use by the Navy and others. Phase II will also provide the foundation for developing a fully functioning software toolset for identifying and tagging protocol features, allowing power users to selectively remove unwanted features and their corresponding code. Being able to remove unwanted features without needing the cooperation of the developer is a tremendous advantage. As a result, expected transition of these tools could extend to a wide range of government and commercial programs interested in improving the security and performance of their software.
Keywords:
Software Feature Identification, Protocol Vulnerability, Communications Protocol, Binary Static Analysis, Feature removal