Award Data

For best search results, use the search terms first and then apply the filters
Reset

The Award database is continually updated throughout the year. As a result, data for FY19 is not expected to be complete until September, 2020.

  1. Automated Embedded Vulnerability Identification and Exploitation Mitigation System Using FRAK, Symbiote and Autotomic Binary Structure Randomization

    SBC: Red Balloon Security, Inc.            Topic: HSB0142002

    We propose to implement a novel Embedded Live-Hardening framework and associated algorithms to combine the state-of-the-art in static firmware vulnerability analysis and mitigation with a suite of novel dynamic defensive techniques powered by Red Balloon Security's software Symbiote technology. While Symbiotes have traditionally been used directly to enforce dynamic firmware integrity attestation ...

    SBIR Phase II 2015 Department of Homeland Security
  2. Miniature, Rugged Vacuum System for Portable Mass Spectrometers

    SBC: CREARE LLC            Topic: HSB0102002

    The Department of Homeland Security, the military, and civilian first responders have an urgent need for sensitive detectors of harmful materials such as biological and chemical warfare agents, toxic industrial chemicals, and explosives. Handheld instruments must be sensitive, be able to detect a wide variety of target compounds in a matter of seconds, reliably discriminate between innocuous and h ...

    SBIR Phase II 2015 Department of Homeland Security
  3. A Scalable, Mobile M2M/SDP/IoT Architecture to Connect First Responders at the Incident Site

    SBC: BALFOUR TECHNOLOGIES LLC            Topic: HSB0141005

    First Responders need to leverage automated (M2M machine-to-machine), mobile connectivity at an incident site. With connectivity automated through M2M network technology, responders would have much improved situational awareness, and can effectively focus their complete attention on the necessary emergency response actions. We propose to develop a futuristic automated M2M prototype system/architec ...

    SBIR Phase II 2015 Department of Homeland Security
  4. Standoff Detection of VBIED and Suicide Bomber

    SBC: Energy Research Company            Topic: HSB072001

    Energy Research Company proposes the continued development of its proprietary technology, Laser Induced Acoustics (LIA), for standoff detection of VBIEDs and suicide bombers, and building a LIA based prototype suitable for high fidelity simulations. LIA uses a laser to interrogate a surface with the resulting acoustic signal indicating the presence of any explosive residues. In addition, we are us ...

    SBIR Phase II 2008 Department of Homeland Security
  5. Novel Methods to Measure Penetrator Dynamics in Multi-Layer Geometries

    SBC: Thornton Tomasetti, Inc.            Topic: DTRA07011

    In Phase I of this effort we analyzed the structural response of a BLU 109 during typical penetration events. Based on these finite element results, we proposed and demsonstrated a simple robust concept for a passive penetrator sensor that identifies the material being penetrated and also correlates strongly with its underground trajectory. Such a sensor would obviously provide valuable informatio ...

    SBIR Phase II 2008 Department of DefenseDefense Threat Reduction Agency
  6. The Characterization and Mitigation of Single Event Effects in Ultra-Deep Submicron (< 90nm) Microelectronics

    SBC: Orora Design Technologies, Inc.            Topic: DTRA07005

    Orora Design Technologies proposes to develop electronic design automation (EDA) tools employing minimally invasive circuit design-based methods to mitigate single event effects (SEEs) for next generation Ultra-DSM CMOS (

    SBIR Phase II 2008 Department of DefenseDefense Threat Reduction Agency
  7. Distributed Network Attack (DNA)-Grid

    SBC: AccessData Corporation            Topic: HSB071006

    AccessData is proposing enhancements to its Distributed Network Attack (DNA)product to increase the functionality which will increase the number of workstations that can participate in the system; from approximately 1,000 to potentially 1,000,000 workstations. This will be accomplished by coupling its world class password attack technology with a proven open source desktop grid computing infrastru ...

    SBIR Phase II 2008 Department of Homeland Security
  8. Sensor Fusion Software to aid in response and evacuation of subterranean incidents

    SBC: DAX TECHNOLOGIES INTERNATIONAL            Topic: HSB071002

    The speed at which an attack is detected is a critical trigger for all responses to follow. The accurate determination of the type of attack will determine the type of emergency personnel and response needed. The location will determine the target response area as well as determine by proximity which of the responders that are available can be first on the scene. Therefore, a system that can do th ...

    SBIR Phase II 2008 Department of Homeland Security
US Flag An Official Website of the United States Government