You are here

Award Data

For best search results, use the search terms first and then apply the filters
Reset

The Award database is continually updated throughout the year. As a result, data for FY24 is not expected to be complete until March, 2025.

Download all SBIR.gov award data either with award abstracts (290MB) or without award abstracts (65MB). A data dictionary and additional information is located on the Data Resource Page. Files are refreshed monthly.

The SBIR.gov award data files now contain the required fields to calculate award timeliness for individual awards or for an agency or branch. Additional information on calculating award timeliness is available on the Data Resource Page.

  1. Code Ray: Software Assurance Risk Management Framework for Hybrid Analysis Mapping

    SBC: APPLIED VISIONS, INC.            Topic: HSB0131002

    Two methods for analyzing software security risks are dynamic application security testing (DAST) - an outside in perspective - and static application security testing (SAST) - and inside out perspective. Both have shortfalls. DAST findings do not give insight into the root cause, making remediation time consuming. SAST tools give you full breadth, but warn of weaknesses that are not exploitable. ...

    SBIR Phase I 2013 Department of Homeland Security
  2. Environmental Pavement Monitor

    SBC: AVS US INC            Topic: 07FH3

    With infrastructure costs escalating it is becoming essential to monitor the health of asphalt and concrete pavement so that timely maintenance can maximize their usefulness. This SBIR will develop a sensor that can be embedded within concrete or asphalt, which can measure moisture, temperature, stress and strain. It will provide critical data for evaluating pavement performance starting with th ...

    SBIR Phase II 2009 Department of Transportation
  3. Software Assurance Analysis and Visual Analytics

    SBC: APPLIED VISIONS, INC.            Topic: N/A

    Software is a mature discipline, yet more than 98 percent of all PCs have one or more vulnerable programs, and in the US there are 2.7 billion programs open for attack. Efforts to address the problem at the source --during software development--are shockingly inadequate, with many commercial Software Assurance tools focused on detection rather than working to become part of the development process ...

    SBIR Phase I 2009 Department of Homeland Security
  4. CodeSonar with Metronome

    SBC: GRAMMATECH INC            Topic: N/A

    The current generation of advanced static-analysis tools find vulnerabilities by exploring all possible executions of a program as configured for a single platform. The next quantum leap in capability will be a system that will explore all executions for many different platforms simultaneously. We propose to develop such a system by combining a number of state-of-the-art techniques. Novel continuo ...

    SBIR Phase I 2009 Department of Homeland Security
  5. Concolic Testing with Metronome

    SBC: GRAMMATECH INC            Topic: N/A

    We propose to build a system that combines novel automatic test generation techniques with state-of-the-art multi-platform continuous integration technology. The proposed system will automatically generate test data by using a combination of symbolic and concrete executions to intelligently explore the space of inputs. The continuous integration technology will enable the system to detect defects ...

    SBIR Phase I 2009 Department of Homeland Security
  6. State-based Security Policies for Electric Power SCADAs

    SBC: ATC-NY INC            Topic: HSB041008

    ATC-NY and Bigwood Systems, Inc. will design and build Zebra, an innovative access control system for electric power SCADA systems. Access control decisions will depend on the dynamic state of the electric transmission/distribution system, in addition to conventional inputs such as identity. We will develop SCADA Access Control Language (SACL) as a means of establishing the policy to be enforced a ...

    SBIR Phase I 2004 Department of Homeland Security
  7. Real-time Malicious Code Detection in Network Traffic: The PAYL Payload Anomaly Detector

    SBC: CounterStorm, Inc. (formally System Detection, Inc.)            Topic: HSB042002

    This proposal, a collaboration between Columbia University and System Detection Inc., concerns the research of a new payload anomaly detector, we call PAYL, that has been demonstrated to detect malicious code in network traffic. The core concept is to statistically model normal content and detect anomalous packet content indicative of malicious exploit code. The approach is very fast to compute, i ...

    SBIR Phase I 2004 Department of Homeland Security
  8. A New Generation of Collaborative Cross-domain Security Technologies: Worminator

    SBC: CounterStorm, Inc. (formally System Detection, Inc.)            Topic: HSB042001

    This proposal, a collaboration between Columbia University and System Detection Inc., concerns the research of a new collaborative, cross-domain security system, which we call Worminator, to detect and prevent the exploitation of and attack against networked computer systems, especially those critical to the nation¿s infrastructure. The core concept is to deploy a number of strategically placed s ...

    SBIR Phase I 2004 Department of Homeland Security
  9. AIS Tracking and Collision Avoidance Equipment for Small Boats

    SBC: Critical Technologies Inc            Topic: HSB041006

    CTI proposes to develop a Class B Automatic Identification System device satisfying two major objectives: hardware cost reduction, so large numbers of smaller boats can be economically equipped; and software enhancement, to convert raw AIS data into decision-quality information, warnings and recommendations, displayed to facilitate rapid comprehension and collision avoidance maneuver by recreation ...

    SBIR Phase I 2004 Department of Homeland Security
  10. Cargo Container Tracking and Monitoring System (C2TMS)

    SBC: INTERNATIONAL ELECTRONIC MACHINES CORPORATION            Topic: N/A

    International Electronic Machines Corp. (IEM), a leader in sensor and GIS technology, will design and prove the feasibility of a Cargo Container Tracking and Monitoring System (C2TMS) which will: uniquely ID each and every container, track container positions to within one foot or less under all conditions using unique, innovative RF localization and digital processing techniques, categorize and t ...

    SBIR Phase I 2004 Department of Homeland Security
US Flag An Official Website of the United States Government