You are here
Award Data
The Award database is continually updated throughout the year. As a result, data for FY24 is not expected to be complete until March, 2025.
Download all SBIR.gov award data either with award abstracts (290MB)
or without award abstracts (65MB).
A data dictionary and additional information is located on the Data Resource Page. Files are refreshed monthly.
The SBIR.gov award data files now contain the required fields to calculate award timeliness for individual awards or for an agency or branch. Additional information on calculating award timeliness is available on the Data Resource Page.
-
Automated SCAP Tool Validator (ASTV)
SBC: ATC-NY INC Topic: 9010377RThe current testing methods of the NIST Security Content Automation Protocol (SCAP) Validation Program are largely manual and labor-intensive, making comprehensive validation of SCAP-enabled IT security products difficult and time-consuming. ATC-NY will design and develop the Automated SCAP Tool Validator (ASTV) for use with the SCAP Public Validation Test Suite and others. ASTV automates the conf ...
SBIR Phase I 2013 Department of CommerceNational Institute of Standards and Technology -
Code Ray: Software Assurance Risk Management Framework for Hybrid Analysis Mapping
SBC: APPLIED VISIONS, INC. Topic: HSB0131002Two methods for analyzing software security risks are dynamic application security testing (DAST) - an outside in perspective - and static application security testing (SAST) - and inside out perspective. Both have shortfalls. DAST findings do not give insight into the root cause, making remediation time consuming. SAST tools give you full breadth, but warn of weaknesses that are not exploitable. ...
SBIR Phase I 2013 Department of Homeland Security -
Practical Roots of Trust for Mobile Devices
SBC: GALOIS, INC. Topic: HSB0132002To meet the critical security needs of the Department of Homeland Security and others, we propose two methods for providing a secure root of trust for mobile devices. One method is designed to integrate as easily into existing systems, while the other requires deeper integration but provides correspondingly stronger security. The keys to our work are practicality and integration: practicality to e ...
SBIR Phase I 2013 Department of Homeland Security