You are here

Award Data

For best search results, use the search terms first and then apply the filters
Reset

The Award database is continually updated throughout the year. As a result, data for FY24 is not expected to be complete until March, 2025.

Download all SBIR.gov award data either with award abstracts (290MB) or without award abstracts (65MB). A data dictionary and additional information is located on the Data Resource Page. Files are refreshed monthly.

The SBIR.gov award data files now contain the required fields to calculate award timeliness for individual awards or for an agency or branch. Additional information on calculating award timeliness is available on the Data Resource Page.

  1. Hybrid Prediction for Embedded Malware

    SBC: RED BALLOON SECURITY, INC.            Topic: HSB0161003

    Predicting malware trends and designing defenses to defeat the next generation of malware is difficult but necessary in order to significantly increase the cost to attackers of developing malware and executing successful attacks. Without such malware trend predictions, we will continually be defending against yesterday's attacks and will remain unprepared for new threats. Embedded devices are beco ...

    SBIR Phase II 2017 Department of Homeland Security
  2. Composite Identity for High Assurance Remote Identity Proofing

    SBC: CARDSMART TECHNOLOGIES, INC.            Topic: HSB0161010

    Remote identity proofing is the process of uniquely verifying an individual that is a party to an online transaction. The degree of difficulty is compounded when attempting to authenticate for the first time a previously unknown individual. This presents an enormous challenge to the secure delivery of online commerce and Government services. In Phase I CardSmart Technologies introduced the nove ...

    SBIR Phase II 2017 Department of Homeland Security
  3. Standoff Detection of VBIED and Suicide Bomber

    SBC: Energy Research Company            Topic: HSB072001

    Energy Research Company proposes the continued development of its proprietary technology, Laser Induced Acoustics (LIA), for standoff detection of VBIEDs and suicide bombers, and building a LIA based prototype suitable for high fidelity simulations. LIA uses a laser to interrogate a surface with the resulting acoustic signal indicating the presence of any explosive residues. In addition, we are us ...

    SBIR Phase II 2008 Department of Homeland Security
  4. Sensor Fusion Software to aid in response and evacuation of subterranean incidents

    SBC: DAX TECHNOLOGIES INTERNATIONAL            Topic: HSB071002

    The speed at which an attack is detected is a critical trigger for all responses to follow. The accurate determination of the type of attack will determine the type of emergency personnel and response needed. The location will determine the target response area as well as determine by proximity which of the responders that are available can be first on the scene. Therefore, a system that can do th ...

    SBIR Phase II 2008 Department of Homeland Security
US Flag An Official Website of the United States Government