You are here

Award Data

For best search results, use the search terms first and then apply the filters
Reset

The Award database is continually updated throughout the year. As a result, data for FY24 is not expected to be complete until March, 2025.

Download all SBIR.gov award data either with award abstracts (290MB) or without award abstracts (65MB). A data dictionary and additional information is located on the Data Resource Page. Files are refreshed monthly.

The SBIR.gov award data files now contain the required fields to calculate award timeliness for individual awards or for an agency or branch. Additional information on calculating award timeliness is available on the Data Resource Page.

  1. Automatic Threat Recognition Algorithm for Volumetric CT Data

    SBC: Telesecurity Sciences, Inc.            Topic: HSB0122002

    For Phase II work, we propose to complete the development of the DICOS compliant ATR algorithm whose feasibility has been demonstrated by results of Phase I work. Important project milestones for the first base year of Phase II are as follows: (1) implementation of the DICOS standard including network protocol, (2) improvement of the proposed ATR algorithm in terms of explosive detection performan ...

    SBIR Phase II 2013 Department of Homeland Security
  2. Bulk Currency Vapor detection in Confined Spaces

    SBC: NEVADA NANOTECH SYSTEMS, INC.            Topic: HSB0132001

    The proposed goal of Nevada Nanotech Systems Inc for the Phase I program is to select a practical technological solution and develop a Con-Ops for the problem of detecting U.S. currency via unique vapor signature(s) in confined spaces for three related, though unique, application scenarios (bags, vehicles, and shipping containers). Nevada Nano will document a matrix of technical and operational re ...

    SBIR Phase I 2013 Department of Homeland Security
  3. Practical Roots of Trust for Mobile Devices

    SBC: GALOIS, INC.            Topic: HSB0132002

    To meet the critical security needs of the Department of Homeland Security and others, we propose two methods for providing a secure root of trust for mobile devices. One method is designed to integrate as easily into existing systems, while the other requires deeper integration but provides correspondingly stronger security. The keys to our work are practicality and integration: practicality to e ...

    SBIR Phase I 2013 Department of Homeland Security
US Flag An Official Website of the United States Government