You are here

Award Data

For best search results, use the search terms first and then apply the filters
Reset

The Award database is continually updated throughout the year. As a result, data for FY24 is not expected to be complete until March, 2025.

Download all SBIR.gov award data either with award abstracts (290MB) or without award abstracts (65MB). A data dictionary and additional information is located on the Data Resource Page. Files are refreshed monthly.

The SBIR.gov award data files now contain the required fields to calculate award timeliness for individual awards or for an agency or branch. Additional information on calculating award timeliness is available on the Data Resource Page.

  1. Extreme Environment Handwear System

    SBC: OUTDOOR RESEARCH            Topic: N/A

    We have identified a multi-component glove/mitt system that will be suitable for the requirements of SOF personnel. This system, as described in our Phase I report, consists of the CCL, the IWDG, the NGG, the FRP, and the TFM. Based on user feedback weintend to suplement this offering with an Advanced Warm Dry Glove (AWDG), and an Extremely Warm Dry Glove in two variants, a Marine Transit versio ...

    SBIR Phase II 2001 Department of DefenseSpecial Operations Command
  2. SBIR Proposal- Hybrid Analysis Mapping (HAM)

    SBC: DENIM GROUP, LTD.            Topic: HSB0131002

    Determine the feasibility of developing a system that can reliably and efficiently correlate and merge the results of open-source and commercial automated static and dynamic security scanning technologies, by creating common data structure standards for both automated static and dynamic security scanning results; research and prototype methods of matching the results of automated static and dynami ...

    SBIR Phase I 2013 Department of Homeland Security
  3. WS-BD Conformant Handheld Multi-biometric Acquisition System

    SBC: Fulcrum Biometrics, LLC            Topic: 9010477TT

    Secure trusted biometric validation of identity has never been more important. The increase in global terrorism, unfettered identity theft and new legislation requiring multi-factor authentication are a few of the driving factors. The biometrics industry has not actively responded to the changing market conditions being driven by the explosion in mobile computing. Millions of new mobile devices ar ...

    SBIR Phase II 2013 Department of CommerceNational Institute of Standards and Technology
  4. Protective Superhydrophobic Coatings for Underwater Electronics

    SBC: LYNNTECH INC.            Topic: SOCOM13001

    Sensitive and expensive electronic equipment used in marine environments are generally subjected to harsh extremes. Component lifetimes are typically extended by physical isolation using bags, hard containers or with conformal impermeable coatings. However, over time, protective measures become compromised, the resulting exposure causing corrosion and short circuit-driven malfunctions. There is ...

    SBIR Phase I 2013 Department of DefenseSpecial Operations Command
  5. Secure Mobile Platform

    SBC: CROSSFIELD TECHNOLOGY LLC            Topic: SOCOM13007

    Crossfield Technology LLC proposes the design and development of an Accelerated Processing Unit (APU) System on Chip (SoC) consisting of a hybrid CPU/GPU digital signal processor. The APU incorporates high-speed interfaces to external sensors and a NAND Flash Controller. The NAND Flash Controller implements XTS-AES-256 encryption commonly used for whole disk encryption, and can securely erase the ...

    SBIR Phase I 2013 Department of DefenseSpecial Operations Command
  6. Physical Unclonable Functions for Mobile Device Roots of Trust

    SBC: DEF-LOGIX INC            Topic: HSB0132002

    Beginning with the release of the iPhone in 2007 and continuing with the increasing popularity of tablet computers, there has been an ever increasing desire to connect "unsecure" mobile devices to secure enterprise networks. Although several pieces of technology exist to meet this need, these devices lack a firm foundation upon which to build trust and security. This paper proposes development o ...

    SBIR Phase I 2013 Department of Homeland Security
  7. Practical Roots of Trust for Mobile Devices

    SBC: GALOIS, INC.            Topic: HSB0132002

    To meet the critical security needs of the Department of Homeland Security and others, we propose two methods for providing a secure root of trust for mobile devices. One method is designed to integrate as easily into existing systems, while the other requires deeper integration but provides correspondingly stronger security. The keys to our work are practicality and integration: practicality to e ...

    SBIR Phase I 2013 Department of Homeland Security
US Flag An Official Website of the United States Government