You are here

Award Data

For best search results, use the search terms first and then apply the filters
Reset

The Award database is continually updated throughout the year. As a result, data for FY24 is not expected to be complete until March, 2025.

Download all SBIR.gov award data either with award abstracts (290MB) or without award abstracts (65MB). A data dictionary and additional information is located on the Data Resource Page. Files are refreshed monthly.

The SBIR.gov award data files now contain the required fields to calculate award timeliness for individual awards or for an agency or branch. Additional information on calculating award timeliness is available on the Data Resource Page.

  1. Bilayer Nanofibers as Wearable Sensors for Detecting Fentanyl Compounds

    SBC: Vaporsens, Inc.            Topic: HSB0181001

    Drug overdose is now the leading cause of death for Americans under 50 years old, with fentanyl claiming more lives than any other drug.Alarmingly, the problem is increasing, with fentanyl overdoses claiming nearly twice as many lives in 2016 compared to 2015.In addition to users, first responders are at risk for coming into contact with fentanyl as they perform their duties.Fentanyl is extremely ...

    SBIR Phase I 2018 Department of Homeland Security
  2. Principled Security Analysis of the Firmware Binaries via Guaranteed Formal Verification and Scalable Dynamic Monitoring

    SBC: Sekurity LLC            Topic: HSB0181008

    Consequently, to protect the mobile/IoT platforms against complex security attacks, there is a need for effective analysis of mobile/IoT firmware. Such a solution is currently missing in the market. In this DHS SBIR effort, we will develop BINSEC, a mobile/IoT firmware binary security analysis framework. To ensure acceptable scalability, usability, and universality across different firmware binary ...

    SBIR Phase I 2018 Department of Homeland Security
  3. Improved Human Systems for Computed TomographySpeed of Image Review

    SBC: IDSS Holdings, Inc.            Topic: HSB0181006

    IDSS in partnership with Tufts University Human Factors Engineering Program, a leader in Engineering Phycology, proposes to study CT screening system operator burden and reduce image review time by reviewing the GUI and the current man-machine interaction, perform a cognitive and behavioral analysis of the interaction, perform a time an motion study and recommend and perform limited prototyping of ...

    SBIR Phase I 2018 Department of Homeland Security
  4. Firmware Automated Analysis at Scale with Testing

    SBC: RED BALLOON SECURITY, INC.            Topic: HSB0181008

    The firmware running on mobile, embedded, and Internet of things devices is often treated as a blackbox by organizations. These firmware images can contain a myriad of n-day vulnerabilities, both malicious and unintentional backdoors, and other unwanted functionality. Unfortunately, analyzing these firmware images is a difficult and time-consuming task as each firmware can be packed with layers of ...

    SBIR Phase I 2018 Department of Homeland Security
  5. Interference Detection and Analysis Device

    SBC: ANDRO COMPUTATIONAL SOLUTIONS LLC            Topic: HSB0181003

    Law enforcement and public safety agencies rely on the 700 MHz/800 MHz spectrum band which are affected by co-channel interference from the commercial radio networks along with unintentional as well as intentional radio frequency interferers (RFIs). The first responders need to be alerted or have prior knowledge of potential interferences at a mission site. This will enable them to adopt strategie ...

    SBIR Phase I 2018 Department of Homeland Security
  6. Standoff Detection of VBIED and Suicide Bomber

    SBC: Energy Research Company            Topic: HSB072001

    Energy Research Company proposes the continued development of its proprietary technology, Laser Induced Acoustics (LIA), for standoff detection of VBIEDs and suicide bombers, and building a LIA based prototype suitable for high fidelity simulations. LIA uses a laser to interrogate a surface with the resulting acoustic signal indicating the presence of any explosive residues. In addition, we are us ...

    SBIR Phase II 2008 Department of Homeland Security
  7. Distributed Network Attack (DNA)-Grid

    SBC: AccessData Corporation            Topic: HSB071006

    AccessData is proposing enhancements to its Distributed Network Attack (DNA)product to increase the functionality which will increase the number of workstations that can participate in the system; from approximately 1,000 to potentially 1,000,000 workstations. This will be accomplished by coupling its world class password attack technology with a proven open source desktop grid computing infrastru ...

    SBIR Phase II 2008 Department of Homeland Security
  8. Landscape vulnerability maps for rare dangerous events

    SBC: Applied Biomathematics Inc            Topic: N/A

    To apportion resources wisely, decision makers need to estimate the location and importance of threats and vulnerabilities at local, regional, and national landscape levels. Dynamic, high quality, geographically explicit data are becoming more and more available for use as inputs to such predictions. However, methods are required for analyzing this data and producing maps of the likelihood of seve ...

    SBIR Phase I 2008 Department of Homeland Security
  9. Innovative Education Environments for Content Delivery, Adaptive Training, and Real-time Decision Support

    SBC: COGNITECH CORPORATION            Topic: N/A

    The proposed Phase I research will design and develop innovative technologies for the deployment of training and educational content to multiple platforms and realtime decision support, just in time learning, and adaptive training. Prototypes will include reuse of PACERs homeland security educational training content and deploy them on an iPhoneiPod Touch and integrated voice response system. This ...

    SBIR Phase I 2008 Department of Homeland Security
  10. Sensor Fusion Software to aid in response and evacuation of subterranean incidents

    SBC: DAX TECHNOLOGIES INTERNATIONAL            Topic: HSB071002

    The speed at which an attack is detected is a critical trigger for all responses to follow. The accurate determination of the type of attack will determine the type of emergency personnel and response needed. The location will determine the target response area as well as determine by proximity which of the responders that are available can be first on the scene. Therefore, a system that can do th ...

    SBIR Phase II 2008 Department of Homeland Security
US Flag An Official Website of the United States Government