You are here

Award Data

For best search results, use the search terms first and then apply the filters
Reset

The Award database is continually updated throughout the year. As a result, data for FY24 is not expected to be complete until March, 2025.

Download all SBIR.gov award data either with award abstracts (290MB) or without award abstracts (65MB). A data dictionary and additional information is located on the Data Resource Page. Files are refreshed monthly.

The SBIR.gov award data files now contain the required fields to calculate award timeliness for individual awards or for an agency or branch. Additional information on calculating award timeliness is available on the Data Resource Page.

  1. Code Ray: Software Assurance Risk Management Framework for Hybrid Analysis Mapping

    SBC: APPLIED VISIONS, INC.            Topic: HSB0131002

    Secure Decisions is developing a software assurance risk management technology called "Code Ray" to: (1) Improve the speed, accuracy and confidence in detection of vulnerabilities by cross-mapping and normalizing the output of hybrid application security testing (HAST) techniques -- dynamic analysis, dynamic tracing, static analysis and contextual analysis. (2) Enhance prioritization and mitigatio ...

    SBIR Phase II 2014 Department of Homeland Security
  2. Test & Evaluation Data Archival Repository (TEDAR) – Phase II

    SBC: ArchSmart, LLC            Topic: 121007

    TEDAR is an intuitive archival database and interfacing system that will serve as a centralized repository for results from testing and evaluation (T&E), modeling and simulation (M&S), and other analysis events sponsored by Federal agencies and other organizations in large-scale evaluation and analysis of radiation/nuclear (RN) detection instruments and procedures. The TEDAR will provide a repo ...

    SBIR Phase II 2014 Department of Homeland Security
  3. Search and Rescue Initial Response Tools

    SBC: DBS Productions, LLC            Topic: HSB0132003

    This proposal will result in innovative and life-saving software enabling first responders to easily see a heat map showing the probability of area for the missing person. Sending teams to the right area saves lives, resources, and time. New research into geographic models of subject behavior, detectability (effective sweep width), and search speed will for the first time provide planners with goo ...

    SBIR Phase II 2014 Department of Homeland Security
  4. ARGUS: Scalable And Reliable RF sensing for Long-Duration Personnel Tracking

    SBC: Intelligent Automation, Inc.            Topic: HSB0131001

    A recent U.S. Government Accountability Office report noted that that less than 1 percent of the 4,000-mile long border between the United States and Canada is under the operational control of U.S. Border Patrol. The large scale, and environmental conditions of the Northern Border pose specific technical challenges to securing the border. In this proposal, we detail a novel mesh networked RF senso ...

    SBIR Phase II 2014 Department of Homeland Security
  5. Quick Release Connector

    SBC: SKY SIGHT TECHNOLOGIES, LLC            Topic: HSB0131005

    The proposed SkySight Technologies Quick Release Connector will independently detect an unexpected mechanical load on the power distribution line. The compact and lightweight SkySight Quick Release Connector uses existing methods and hardware to integrate into the infrastructure, and no special tools or skills are required. While the connector can be latched by hand without any special tools, it c ...

    SBIR Phase II 2014 Department of Homeland Security
  6. Software-based Dynamic Mobile Trusted Module (SW-dMTM)

    SBC: BLUERISC INC            Topic: HSB0132002

    The proposed SW-dMTM mobile security solution is lean and fully-software-based. The goal is to provide the required Roots of Trust (RoTs) and trusted security services via a fully software implementation while maintaining the heightened level of assurance typically only achieved through additional, security-centric hardware. This will be achieved by building a solution that is not only compatibl ...

    SBIR Phase II 2014 Department of Homeland Security
  7. Detection of Counterfeit Commodity Goods

    SBC: TIAX LLC            Topic: HSB0132005

    In the Phase I program, TIAX LLC developed a detection methodology that was able to measure significant differences between pairs of counterfeit and authentic products in four different product categories. Establishing the proof-of-concept of this technique creates the potential for a new detection methodology that can be utilized at a port of entry by U.S. Customs and Border Protection (CBP) to i ...

    SBIR Phase II 2014 Department of Homeland Security
  8. Helmet-Mounted Thermal Sensor for First Responder Burn-Saver Device

    SBC: TDA RESEARCH, INC.            Topic: HSB0131003

    The personal protective equipment (PPE) worn by firefighters protects them against burns and hazardous environments. This equipment works so well that they may not notice that their environment has become so hot that is no longer safe. Although current thermal sensor technologies (generally built in to Personal Alert Safety System (PASS) units) can trigger an alarm when the temperature is too hig ...

    SBIR Phase II 2014 Department of Homeland Security
  9. SBIR Proposal- Hybrid Analysis Mapping (HAM)-- Phase 2

    SBC: DENIM GROUP, LTD.            Topic: HSB0131002

    Develop a system that can reliably and efficiently correlate and merge the results of open-source and commercial automated static and dynamic security scanning technologies, using common data structure standards for both automated static and dynamic security scanning results; building methods of matching the results of automated static and dynamic tools. The goal of Phase II will be to deliver a f ...

    SBIR Phase II 2014 Department of Homeland Security
  10. Practical Roots of Trust for Mobile Devices

    SBC: GALOIS, INC.            Topic: HSB0132002

    To meet the critical security needs of the Department of Homeland Security and others, we propose two methods for providing a secure root of trust for mobile devices. One method is designed to integrate as easily into existing systems, while the other requires deeper integration but provides correspondingly stronger security. The keys to our work are practicality and integration: practicality to e ...

    SBIR Phase II 2014 Department of Homeland Security
US Flag An Official Website of the United States Government