You are here

Award Data

For best search results, use the search terms first and then apply the filters
Reset

The Award database is continually updated throughout the year. As a result, data for FY24 is not expected to be complete until March, 2025.

Download all SBIR.gov award data either with award abstracts (290MB) or without award abstracts (65MB). A data dictionary and additional information is located on the Data Resource Page. Files are refreshed monthly.

The SBIR.gov award data files now contain the required fields to calculate award timeliness for individual awards or for an agency or branch. Additional information on calculating award timeliness is available on the Data Resource Page.

  1. SBIR Proposal- Hybrid Analysis Mapping (HAM)

    SBC: DENIM GROUP, LTD.            Topic: HSB0131002

    Determine the feasibility of developing a system that can reliably and efficiently correlate and merge the results of open-source and commercial automated static and dynamic security scanning technologies, by creating common data structure standards for both automated static and dynamic security scanning results; research and prototype methods of matching the results of automated static and dynami ...

    SBIR Phase I 2013 Department of Homeland Security
  2. Physical Unclonable Functions for Mobile Device Roots of Trust

    SBC: DEF-LOGIX INC            Topic: HSB0132002

    Beginning with the release of the iPhone in 2007 and continuing with the increasing popularity of tablet computers, there has been an ever increasing desire to connect "unsecure" mobile devices to secure enterprise networks. Although several pieces of technology exist to meet this need, these devices lack a firm foundation upon which to build trust and security. This paper proposes development o ...

    SBIR Phase I 2013 Department of Homeland Security
  3. Practical Roots of Trust for Mobile Devices

    SBC: GALOIS, INC.            Topic: HSB0132002

    To meet the critical security needs of the Department of Homeland Security and others, we propose two methods for providing a secure root of trust for mobile devices. One method is designed to integrate as easily into existing systems, while the other requires deeper integration but provides correspondingly stronger security. The keys to our work are practicality and integration: practicality to e ...

    SBIR Phase I 2013 Department of Homeland Security
US Flag An Official Website of the United States Government