You are here

Award Data

For best search results, use the search terms first and then apply the filters
Reset

The Award database is continually updated throughout the year. As a result, data for FY24 is not expected to be complete until March, 2025.

Download all SBIR.gov award data either with award abstracts (290MB) or without award abstracts (65MB). A data dictionary and additional information is located on the Data Resource Page. Files are refreshed monthly.

The SBIR.gov award data files now contain the required fields to calculate award timeliness for individual awards or for an agency or branch. Additional information on calculating award timeliness is available on the Data Resource Page.

  1. Malicious Logic Behavior Monitoring and Control System

    SBC: 2LRESEARCH            Topic: OSD04SP5

    This SBIR effort proposes to develop tools that enable a capability in tamper proof source code. The proposed methods will protect against several modes of attack including malicious programmers, source code viruses, and system worms. The tools and techniques proposed are based on the fundamental logical structure of the application under protection and offer dynamic monitor and control of runtim ...

    SBIR Phase I 2005 Department of DefenseAir Force
  2. Application of Cortical Processing Theory to Acoustical Analysis

    SBC: Advanced Acoustic Concepts, Inc.            Topic: AF03T006

    Advanced Acoustic Concepts, Inc. (AAC) proposes to extend its Phase I work in Auditory Cortex based sound classification. During Phase I AAC demonstrated the feasibility and accuracy of a computational model of human auditory processing based upon this cortical theory. AAC also demonstrated the concept by collecting a large number speech sounds and bird calls of various species and appling the cor ...

    STTR Phase II 2005 Department of DefenseAir Force
  3. Next Generation Aircraft Depot Maintenance Management Technologies

    SBC: Anautics, Inc.            Topic: AF05265

    Anautics proposes to discover, research, and evaluate new technologies, methods and tools, as well as recommend demonstrated capabilities known to them through working with Industry, Universities, Aging Aircraft, CASI and COSSI projects. While many systems promise to integrate all aspects of your enterprise, most enterprises don't deal with Depot MRO and the government aspects in one enterprise. ...

    SBIR Phase I 2005 Department of DefenseAir Force
  4. Pattern Recognition for Aircraft Maintainer Troubleshooting

    SBC: Anautics, Inc.            Topic: AF05263

    The proposed system shall have the ability to learn from past actions and recommend best course of action for a maintainer. The proposed research is expected to benefit managers, equipment specialists, engineers, planners, schedulers, supervisors, and mechanics. Cost and flow day reduction benefits for depot should result from reduced time for diagnosis and repair, accurate information on part p ...

    SBIR Phase I 2005 Department of DefenseAir Force
  5. Enhance Visual Target Detection Using Nonlinear Stochastic Resonance Technique

    SBC: APPLIED SR TECHNOLOGIES, INC.            Topic: AF05T021

    Techniques to detect and identify the interested target burying in cluttered background and noise have been widely needed in both military and civilian applications. The enhancement of the target detectability is a critical factor in improving the performance of detectors. The team of Applied SR Technologies, Inc. and the Polytechnic University at Brooklyn, New York is exploring new interdisciplin ...

    STTR Phase I 2005 Department of DefenseAir Force
  6. PMAF, a Pedigree Management and Assessment Framework

    SBC: ATC-NY INC            Topic: AF05105

    Warfighters need information that is both timely and trustworthy. New initiatives such as the Joint Battlespace Infosphere and Net-Centric Enterprise Services have the goal of getting "raw" information to the warfighter as quickly as possible. In order to assess the trustworthiness of such information, the warfighter must be able to automatically check its provenance. PMAF will provide an exten ...

    SBIR Phase I 2005 Department of DefenseAir Force
  7. CYDEST: CYber DEfense Simulation Trainer

    SBC: ATC-NY INC            Topic: AF05077

    As the level of conflict increases in the new battlefield of our nation's infosphere, the demand for better training of cyber security professionals is critical. In response, a small number of efforts have attempted to provide network defense training simulators to prepare students for real-world conditions. Most of these early efforts have fallen short of the mark, generally by oversimplifying ...

    SBIR Phase I 2005 Department of DefenseAir Force
  8. Dynamet: A Dynamic, Enterprise-Scale Information Flow Management Environment

    SBC: ATC-NY INC            Topic: AF05097

    Mission success requires accurate, timely, and relevant information to be available to decision makers and those taking action in the field. Too often, this information is not available because the needed systems do not interoperate, or because the end user doesn't have the software or access necessary. Worse, changes in the operating environment, mission goals, or incoming information cannot en ...

    SBIR Phase I 2005 Department of DefenseAir Force
  9. AESOP- Automatic Extraction and verification of Security features Of Programs

    SBC: ATC-NY INC            Topic: OSD04SP6

    To address the threat of malicious third party software modules, ATC-NY, Professor Dexter Kozen, Cornell University, and Architecture Technology Corporation, will create AESOP, a static analysis tool that automatically extracts a digest of the security-relevant behavior of a software module at compile-time, which can be verified at load-time for accuracy and for compliance with a security policy. ...

    SBIR Phase I 2005 Department of DefenseAir Force
  10. Software Pedigree Analyzer

    SBC: ATC-NY INC            Topic: OSD04SP7

    Software protection methods are needed in order to prevent the unauthorized distribution and exploitation of critical national security software. This proposal addresses software protection during the software development process, and in particular, the collection, analysis, and response mechanisms associated with auditing how software is built. Such information for a code module is called its s ...

    SBIR Phase I 2005 Department of DefenseAir Force
US Flag An Official Website of the United States Government