Log in
Enquire now
‌

Stealth Software Technologies, Inc. SBIR Phase II Award, September 2022

A SBIR Phase II contract was awarded to Eclipse Talent Partners in September, 2022 for $1,499,997.0 USD from the U.S. Department of Defense and Strategic Capabilities Office.

OverviewStructured DataIssuesContributors

Contents

sbir.gov/node/2331655
Is a
SBIR/STTR Awards
SBIR/STTR Awards

SBIR/STTR Award attributes

SBIR/STTR Award Recipient
Eclipse Talent Partners
Eclipse Talent Partners
0
Government Agency
U.S. Department of Defense
U.S. Department of Defense
0
Government Branch
‌
Strategic Capabilities Office
0
Award Type
SBIR0
Contract Number (US Government)
HQ003422C01020
Award Phase
Phase II0
Award Amount (USD)
1,499,9970
Date Awarded
September 28, 2022
0
End Date
September 27, 2024
0
Abstract

Cyber infrastructures efficiently supporting data collection and transmission have become essential to the mission of the United States Department of Defense (DoD). Intelligence is an extremely important element that impacts DoD’s strategic decisions at critical times. The success f intelligence operations is possible only if quality data/information—and actionable insights from that data—are securely, robustly, and efficiently collected in the field and transmitted back to DoD personnel. However, such information collection poses non-trivial technical challenges due to the fact that the recent advancements of network and artificial intelligence reinforce adversaries’ capabilities of surveillance and disruption as a cyber threat. Stealth Software Technologies, Inc. (Stealth) proposes to develop a secure and private network data aggregation system that can carry out secure aggregate computation from two or more two or more data-collecting intelligence sources with practical efficiency and scalability. In addition, Stealth’s proposed technology will be equipped with an auxiliary data exfiltration mechanism which only utilizes an out-of-band phone-to-phone ad-hoc network to transmit data while avoiding detection in case existing communication networks become compromised or unavailable. Our proposed technology will be developed upon cutting-edge cryptographic systems known as Secure Multiparty Computation (MPC). A MPC protocol is a distributed protocol that enables multiple distrusting servers with secret inputs to compute functions over the secret inputs so that the servers will learn only the output of the computation even if a subset of participating servers are compromised. Using our MPC protocols, we will develop a secure and robust midpoint consisting of a group of servers (e.g., 5 ~ servers) jointly carrying out secure filtering operations and aggregate computations over data uploaded by data collectors. The secure filtering protocol can down-select the intelligence data to a smaller, refined dataset according to conditions (e.g. expressed as keywords, thresholds, and so on) that can be controlled and set up by DoD personnel. In addition, DoD personnel will have control over what aggregate will be computed at the midpoint. Stealth will develop the platform, architecture, and tool chain necessary to integrate Stealth's innovative MPC technologies into the workflow of DoD’s desired data midpoint operations, as well as the detection-avoiding exfiltration protocol. The intelligence data transmission and analysis will be modeled and prototyped as MPC computations with an MPC-friendly data format.

Timeline

No Timeline data yet.

Further Resources

Title
Author
Link
Type
Date
No Further Resources data yet.

References

Find more entities like Stealth Software Technologies, Inc. SBIR Phase II Award, September 2022

Use the Golden Query Tool to find similar entities by any field in the Knowledge Graph, including industry, location, and more.
Open Query Tool
Access by API
Golden Query Tool
Golden logo

Company

  • Home
  • Press & Media
  • Blog
  • Careers
  • WE'RE HIRING

Products

  • Knowledge Graph
  • Query Tool
  • Data Requests
  • Knowledge Storage
  • API
  • Pricing
  • Enterprise
  • ChatGPT Plugin

Legal

  • Terms of Service
  • Enterprise Terms of Service
  • Privacy Policy

Help

  • Help center
  • API Documentation
  • Contact Us
By using this site, you agree to our Terms of Service.