You are here


Company Information
SAN DIEGO, CA 92108-3108
United States



# of Employees: 10

Ownership Information

HUBZone Owned: No

Socially and Economically Disadvantaged: No

Woman Owned: No

Award Charts

Award Listing

  1. Automated and Scalable Analysis of Mobile and IoT Device Firmware

    Amount: $149,999.84

    As Internet of Things (IoT) and mobile devices become increasingly popular and widely used, the security of the firmware running on these devices is paramount.However, due to the lack of an efficient ...

    SBIRPhase I2018Department of Homeland Security
  2. Detecting Embedded Vulnerabilities in Software (DEVIS)

    Amount: $750,000.00

    Employing software assurance techniques to detect vulnerabilities in binary executables running on embedded systems presents a variety of unique challenges. First, embedded systems are subject to cust ...

    SBIRPhase II2017Department of Defense Air Force
  3. Enhanced Blockchain Trust Services

    Amount: $100,000.00

    Several security shortfalls associated with the Internet of Things (IoTs) are related to key management and distributions, which are used to encrypt, sign and authenticate messages and remotely manage ...

    SBIRPhase I2016Department of Homeland Security
  4. Detecting Embedded Vulnerabilities in Software (DEVIS)

    Amount: $149,999.00

    ABSTRACT: To address embedded software security challenges found in Cyber Physical Systems, we propose to build a Detecting Embedded Vulnerabilities in Software (DEVIS) toolkit that employs dynamic bi ...

    SBIRPhase I2016Department of Defense Air Force
  5. Privacy-based Analytics for Weather and Radiological Emergencies

    Amount: $99,999.34

    The Department of Homeland Security (DHS) is looking for solutions that not only provide enhanced security and safety by leveraging sensors found on the Internet of Things (IoT) but also suppress data ...

    SBIRPhase I2015Department of Homeland Security
  6. A Real-Time Application Security Analyzer

    Amount: $749,993.50

    Software developers are faced with a variety of security challenges when developing and deploying new systems. The software may be subject to malicious insiders, external threats and supply chain thr ...

    SBIRPhase II2015Department of Homeland Security
  7. Counter Intelligence Surveillance and Reconnaissance and Targeting (C-ISRT), for Anti-Access / Aerial Denial (C-A2/AD)

    Amount: $79,994.00

    The Navy is looking for algorithms and methods that measure the effectiveness of Counter Intelligence Surveillance and Reconnaissance and Targeting (C-ISRT), Cyber and Electronic Warfare effects in su ...

    SBIRPhase I2015Department of Defense Navy
  8. Protected Execution in Cloud Environments (PECE)

    Amount: $749,998.00

    ABSTRACT:As mission-based applications are deployed in the cloud, they are subject to resource constraints and environmental factors that drive their migration from instance to instance, possibly resu ...

    SBIRPhase II2015Department of Defense Air Force
  9. Protected Execution in Cloud Environments (PECE)

    Amount: $150,000.00

    ABSTRACT: As the Air Force migrates their mission-based applications to the cloud, those applications are subject to attacks against the cloud instances on which they reside. Applications are subject ...

    SBIRPhase I2014Department of Defense Air Force
  10. Software Based Roots of Trust for Enhanced Mobile Device Security

    Amount: $99,999.14

    Mobile devices require security features that are utilized by application developers and users to ensure secure communication and commerce. Existing features on mobile hardware are often considered pr ...

    SBIRPhase I2013Department of Homeland Security
US Flag An Official Website of the United States Government