You are here

Award Data

For best search results, use the search terms first and then apply the filters
Reset

The Award database is continually updated throughout the year. As a result, data for FY24 is not expected to be complete until March, 2025.

Download all SBIR.gov award data either with award abstracts (290MB) or without award abstracts (65MB). A data dictionary and additional information is located on the Data Resource Page. Files are refreshed monthly.

The SBIR.gov award data files now contain the required fields to calculate award timeliness for individual awards or for an agency or branch. Additional information on calculating award timeliness is available on the Data Resource Page.

  1. Practical Roots of Trust for Mobile Devices

    SBC: GALOIS, INC.            Topic: HSB0132002

    To meet the critical security needs of the Department of Homeland Security and others, we propose two methods for providing a secure root of trust for mobile devices. One method is designed to integrate as easily into existing systems, while the other requires deeper integration but provides correspondingly stronger security. The keys to our work are practicality and integration: practicality to e ...

    SBIR Phase I 2013 Department of Homeland Security
  2. Dynamic Frequency Passive Millimeter-Wave Radiometer Based on Optical Up-Conversion

    SBC: PHASE SENSITIVE INNOVATIONS INC            Topic: 941D

    In the proposed effort, we will leverage this extensive experience and capabilities to realize a frequency agile mmW radiometer that can cover the range of DC-110 GHz and can be scaled to DC-200 GHz under Phase II. Ours is a photonic system that multiplies and up-coverts a low-frequency reference signal onto an optical carrier (laser) using EO modulation, then uses the modulation sidebands to inj ...

    SBIR Phase I 2013 Department of CommerceNational Oceanic and Atmospheric Administration
  3. Code Ray: Software Assurance Risk Management Framework for Hybrid Analysis Mapping

    SBC: APPLIED VISIONS, INC.            Topic: HSB0131002

    Two methods for analyzing software security risks are dynamic application security testing (DAST) - an outside in perspective - and static application security testing (SAST) - and inside out perspective. Both have shortfalls. DAST findings do not give insight into the root cause, making remediation time consuming. SAST tools give you full breadth, but warn of weaknesses that are not exploitable. ...

    SBIR Phase I 2013 Department of Homeland Security
  4. Automated SCAP Tool Validator (ASTV)

    SBC: ATC-NY INC            Topic: 9010377R

    The current testing methods of the NIST Security Content Automation Protocol (SCAP) Validation Program are largely manual and labor-intensive, making comprehensive validation of SCAP-enabled IT security products difficult and time-consuming. ATC-NY will design and develop the Automated SCAP Tool Validator (ASTV) for use with the SCAP Public Validation Test Suite and others. ASTV automates the conf ...

    SBIR Phase I 2013 Department of CommerceNational Institute of Standards and Technology
US Flag An Official Website of the United States Government