Innovative
Products
SecureView®
SecureView® is a virtualized platform solution that enables a single workstation to access multiple levels of security and different classified networks, transforming ordinary PCs and workstations into superior cyber security platforms.IntroVirt®
Our Introspective Virtualization tool is a customized Xen Hypervisor and library with a VM introspection API. By looking at the memory of a virtual machine during runtime, we can reverse engineer, debug software, and secure guest VMs.IntroVirt®
Introspective Virtualization, or IntroVirt®, is a customized Xen Hypervisor and library that provides a robust virtual machine (VM) introspection application programming interface (API). VM introspection is the process of looking at the memory contents of a virtual machine during runtime. By applying knowledge of the guest operating system, introspection can be used for a variety of applications, including reverse engineering, debugging software, and securing guest VMs by limiting access to files or limiting an executing application’s functionality.
IntroVirt consists of two components: a patched version of the Xen Hypervisor, and the IntroVirt® userland library. The Windows® IntroVirt library, WintroVirt, can be used as a userland library that sits above IntroVirt to interact with Windows®-based guests. As IntroVirt and WintroVirt are both libraries, they use the widely accepted library nomenclature, referred to as libintrovirt and libwintrovirt, respectively.
Download: IntroVirt® Technology Overview Sheet
Proven Application Areas:
- Cyber asset protection
- Malware analysis
- Reverse engineering
- Dynamic application analysis
- Dynamic forensic analysis
- Training & simulation
- Experimentation & instrumentation
- Cloud security
Advantage: IntroVirt®
- Collect and analyze non-invasively, without guest cooperation
- Enable and disable event interception—context-based, with low overhead
- Enforce policy, manipulate the environment, and terminate a process
- Examine core Windows® data structures
- Trace Windows® system calls, system call returns, and arguments
Check back to this page, as we’ll be adding new content on a regular basis, along with more detailed descriptions.
If you experience any security problems or other issues with our services or products such as SecureView, OpenXT, or IntroVirt, please contact our technical team immediately.
SearchLight
Developed by AIS and WetStone Technologies, SearchLight improves the effectiveness and efficiency of investigative analysis of network pcap files.SearchLight
Investigative analysis of network pcap files is a tedious and error-prone process. Additional challenges, such as analysis of large pcaps, multiple pcaps, and lack of a highly tuned search and filtering engine, impair the effectiveness and efficiency of investigations. SearchLight™, developed by AIS and WetStone Technologies, addresses these issues and many more.
Visit WetStone Technologies to learn more about SearchLight.
WiFi Investigator®
WiFi Investigator® supports the wireless security needs of military, law enforcement, intelligence, and private sector operationsWiFi Investigator
WiFi Investigator® was developed and is maintained exclusively by AIS to support the wireless security needs of military, law enforcement, intelligence, and private sector operations. Specifically, WiFi Investigator® allows you to passively detect, locate, and analyze broadcasting 802.11 devices in real-time, and at a stand-off distance, without cooperation from the target(s). These capabilities are supported for 802.11 devices communicating over 2.4GHz and 5GHz frequencies, on a/b/g/n bands. WiFi Investigator® operates in passive mode, meaning it doesn’t broadcast data, and doesn’t attempt to connect to devices. In addition, packet collection, while possible, is disabled by default. As such, detection and location capabilities use packet header data, available regardless of encryption settings. The device can be used as a hand-held direction-finding utility, as a flat directional panel is mounted to the front. If war-driving sweeps are necessary, the flat-panel antenna can be disconnected, allowing the connection of an AIS Certified Omni-Directional antenna, available within the optional WiFi Investigator® Field Accessory Kit.
Applications:
- Criminal investigations
- Network and sensitive data protection
- Policy compliance
- Security assessments
Additional Features
- Directionally find or war-drive with seamless antenna swap
- Multiband capability covering the 2.4GHz and 5GHz bands
- Visualize captured data within Google EarthTM mapping service
- V3 Field Accessory Kits include all required war-drive hardware
For additional product information, please visit wifi-investigator.com
Patents
As cyber threats increase, we’re always innovating, and creating new tools for our customers. A number of our original solutions have been patented.Patents
Our talented staff are continually developing original, innovative, next-gen cyber tools and capabilities. Our national recognition, and growing list of patents, is a testament to this philosophy. We’re always exploring new frontiers and patenting new products, like those listed below. Check back to this page for updates.
Product Name: FUSS
Patent No.: US 9,639,671 B2
Description: Secure Execution of Encrypted Program Instructions
Date of Patent: May 2, 2017
Inventor: Jacob Torrey
Product Name: IntroVirt®
Patent No.: US 9,619,346 B2
Description: Virtual Machine Introspection Facilities
Date of Patent: April 11, 2017
Inventor: Stephen Raymond Pape
Product Name: LastDefense
Patent No.: US 9,654,498 B2
Description: Detecting Deviation From a Data Packet Send-Protocol in a Computer System
Date of Patent: May 16, 2017
Inventors: Robert Durham, Kyle Patton, Levi Arthur
Product Name: MoRE
Patent No. – US 8,856,789 B2
Description: Facilitating Execution of a Self-Modifying Executable
Date of Patent: October 7, 2014
Inventor: Jacob Torrey
Product Name: MultiView®
Patent No.: US 9,335,886 B2
Description: Facilitating User Interaction with Multiple Domains While Preventing Cross-Domain Transfer of Data
Date of Patent: May 10, 2016
Inventors: Rian Patrick Quinn, Brendan Timothy Kerrigan
Product Name: Secure Boot
Patent No. – US 8,478,974 B2
Description: Method and System for Reducing Impact of Malware during a Booting Sequence
Date of Patent: July 2, 2013
Inventors: Ryan Matthew Wilson, Joseph James Sharkey, Michael Joseph Sieffert
Product Name: SED-Tools Multi-Drive Protection
Patent No.: US 9,871,787 B2
Description: Authentication Processing for a Plurality of Self-Encrypting Storage Devices
Date of Patent: January 16, 2016
Inventor: Maurice Gale
Product Name: TED OS
Patent No. – US 8,996,642 B2
Description: Trust Verification of a Computing Platform Using a Peripheral Device
Date of Patent: February 24, 2015
Inventors: Rian Quinn, Jacob Torrey
Product Name: WiFi Investigator®
Patent No. – US 8,098,155 B2
Description: System and Method for Locating a Target Wireless Device
Date of Patent: January 17, 2012
Inventors: Richard Michael Gloo, Jacob Michael Baker, Alexander James Williams, Jason S. LaShure, Robert James Durham, Nicholas Lawrence Owens
Product Name: WiFi Investigator® (Canada)
Patent No.: CA 2,761,818
Description: System and Method for Locating a Target Wireless Device
Issued: July 4, 2017
Inventors: Richard Michael Gloo, Jacob Michael Baker, Alexander James Williams, Jason S. LaShure, Robert James Durham, Nicholas Lawrence Owens