List

For best search results, use the search terms first and then apply the filters
Reset

The Award database is continually updated throughout the year. As a result, data for the given year is not complete until April of the following year. Annual Reports data is a snapshot of agency reported information for that year and hence might look different from the live data in the Awards Information charts.

  1. Countermeasures to Covert Access Methods to Reduce Attack Susceptibility and Ensure Trust

    SBC: Edaptive Computing, Inc.            Topic: OSD09-IA2

    ABSTRACT:Sophisticated methods for infiltrating and compromising computer systems have continuously demonstrated their ability to defeat current operating system and network defenses. Computing assets such as the BIOS, hardware device drivers, and COTS hardware from non-trusted supply chains have been proven to include malware and/or Trojan horse applications. These subversive software programs pr ...

    SBIR Phase II 2016 Department of DefenseOffice of the Secretary of Defense
  2. Digital SQUID Array for Portable Low-Field MRI System for Combat Diagnostics

    SBC: HYPRES, INC.            Topic: OSD11-H18

    Hypres is pleased to submit this proposal to continue its Phase II SBIR program and complete the development of a combat-area portable digital MRI (Magnetic Resonance Imaging) system capable of high-resolution Traumatic Brain Injury (TBI) diagnosis in field hospitals. This sequential Phase IIc SBIR program will produce and demonstrate a near production ready state-of-the-art portable MRI system at ...

    SBIR Phase II 2016 Department of DefenseOffice of the Secretary of Defense
  3. System Architecture Recovery and Analysis (SARA)

    SBC: BlueRISC Inc            Topic: OSD153-001

    BlueRISCs proposed solution takes the form of a binary-level toolkit that provides a fundamentally new approach to enable the extraction of a vulnerability-focused architectural model as well as an interactive security-focused visualization framework from an embedded software binary without any source-code knowledge. It is based on a conceptual framework that is able to identify and model externa ...

    SBIR Phase I 2016 Department of DefenseOffice of the Secretary of Defense
  4. Panorama: Recovering the High-Level Architecture of Embedded Systems

    SBC: GRAMMATECH, INC.            Topic: OSD153-001

    GrammaTech proposes Panorama, an architecture recovery platform for embedded binary software that: - Identifies component boundaries and data flows between components. - Helps determine critical, security-relevant locations in the software. - Provides the ability to drill down into individual components to inspect critical access points for flaws. To be an effective analysis platform for t ...

    SBIR Phase I 2016 Department of DefenseOffice of the Secretary of Defense
  5. Cyber Deception for Network Defense

    SBC: GRIER FORENSICS, LLC            Topic: OSD153-002

    To meet Department of Defense needs for a cyber deception capability, Grier Forensics proposes building a cyber deception system based on our AVENGE Avatar Engine. Using AVENGE, commanders will be able to provide false information that will confuse, delay, and impede attackers, with only minimal impact to legitimate users and friendly forces. AVENGE will be developed to provide multidimensional ...

    SBIR Phase I 2016 Department of DefenseOffice of the Secretary of Defense
  6. Cyber Deception for Network Defense

    SBC: Veramine, Inc.            Topic: OSD153-002

    Cyber deception can be used not only as a cyber attack detection mechanism but also as an effective way help friendly forces in response to a cyber attack detection.

    SBIR Phase I 2016 Department of DefenseOffice of the Secretary of Defense
  7. Situation Aware Network Deception Management (SANDMan)

    SBC: BOSTON FUSION CORP.            Topic: OSD153-002

    Defending against state-of-the-art cyber attacks such as Advanced Persistent Threats requires the capability to counter the adversarys actions after they have already gained a foothold within our networks. Network deception techniques, working in conjunction with normal cyber defense methods, can alter the underlying attack process, making it more difficult, time consuming, and cost prohibitive fo ...

    SBIR Phase I 2016 Department of DefenseOffice of the Secretary of Defense
  8. Next-Generation Secured Mobile Devices for Mobile, Tactical Environments

    SBC: METRONOME SOFTWARE, LLC            Topic: OSD153-003

    Metronome Software develops a Domain Encryption (DomCrypt) system for securing Android-based Commercial Off The Shield (COTS) mobile devices. DomCrypt software suite, through its creation of separate DomCrypt-encrypted domains, provides the warfighters the means for accessing and dynamically sharing data in a variety of formats using COTS mobile devices. Metronome also employs a strong-security fo ...

    SBIR Phase I 2016 Department of DefenseOffice of the Secretary of Defense
  9. Single-chip Network Privacy Appliance

    SBC: Web Sensing, LLC            Topic: OSD153-003

    We propose to develop a line of mobile security products that provide transparent protection for wireless and wired communication. The products can be deployed either as a wireless or cellular access point (WAP) or inserted within the wired Gigabit Ethernet path to a computer or subnet. Our approach leverages lessons learned from DoD PL5 high-assurance guards (HAGs) with pre-configured public-key ...

    SBIR Phase I 2016 Department of DefenseOffice of the Secretary of Defense
  10. Fast Network Information Scrambling Technology

    SBC: PHYSICAL OPTICS CORPORATION            Topic: OSD153-004

    To address the OSDs need for a network defense technology based upon dynamic adaptation of a network or an intruders perception of it, Physical Optics Corporation (POC) proposes a new Fast Network Information Scrambling Technology (FIST). FIST is based on an innovative low-complexity network information scrambler algorithm implemented on low-cost small-scale commercial off-the-shelf hardware compo ...

    SBIR Phase I 2016 Department of DefenseOffice of the Secretary of Defense

Agency Micro-sites

SBA logo
Department of Agriculture logo
Department of Commerce logo
Department of Defense logo
Department of Education logo
Department of Energy logo
Department of Health and Human Services logo
Department of Homeland Security logo
Department of Transportation logo
Environmental Protection Agency logo
National Aeronautics and Space Administration logo
National Science Foundation logo
US Flag An Official Website of the United States Government