You are here

Award Data

For best search results, use the search terms first and then apply the filters
Reset

The Award database is continually updated throughout the year. As a result, data for FY24 is not expected to be complete until March, 2025.

Download all SBIR.gov award data either with award abstracts (290MB) or without award abstracts (65MB). A data dictionary and additional information is located on the Data Resource Page. Files are refreshed monthly.

The SBIR.gov award data files now contain the required fields to calculate award timeliness for individual awards or for an agency or branch. Additional information on calculating award timeliness is available on the Data Resource Page.

  1. System Architecture Recovery and Analysis (SARA)

    SBC: BLUERISC INC            Topic: OSD153001

    BlueRISCs proposed solution takes the form of a binary-level toolkit that provides a fundamentally new approach to enable the extraction of a vulnerability-focused architectural model as well as an interactive security-focused visualization framework from an embedded software binary without any source-code knowledge.It is based on a conceptual framework that is able to identify and model external ...

    SBIR Phase I 2016 Department of DefenseOffice of the Secretary of Defense
  2. Situation Aware Network Deception Management (SANDMan)

    SBC: BOSTON FUSION CORP            Topic: OSD153002

    Defending against state-of-the-art cyber attacks such as Advanced Persistent Threats requires the capability to counter the adversarys actions after they have already gained a foothold within our networks. Network deception techniques, working in conjunction with normal cyber defense methods, can alter the underlying attack process, making it more difficult, time consuming, and cost prohibitive fo ...

    SBIR Phase I 2016 Department of DefenseOffice of the Secretary of Defense
  3. Next-Generation Secured Mobile Devices for Mobile, Tactical Environments

    SBC: METRONOME SOFTWARE, LLC            Topic: OSD153003

    Metronome Software develops a Domain Encryption (DomCrypt) system for securing Android-based Commercial Off The Shield (COTS) mobile devices. DomCrypt software suite, through its creation of separate DomCrypt-encrypted domains, provides the warfighters the means for accessing and dynamically sharing data in a variety of formats using COTS mobile devices. Metronome also employs a strong-security fo ...

    SBIR Phase I 2016 Department of DefenseOffice of the Secretary of Defense
  4. Fast Network Information Scrambling Technology

    SBC: Physical Optics Corporation            Topic: OSD153004

    To address the OSDs need for a network defense technology based upon dynamic adaptation of a network or an intruders perception of it, Physical Optics Corporation (POC) proposes a new Fast Network Information Scrambling Technology (FIST). FIST is based on an innovative low-complexity network information scrambler algorithm implemented on low-cost small-scale commercial off-the-shelf hardware compo ...

    SBIR Phase I 2016 Department of DefenseOffice of the Secretary of Defense
  5. Augmented Reality Training for Dismounted Soldiers

    SBC: SA PHOTONICS, LLC            Topic: OSD162004X

    The commercial marketplace has made tremendous advances in Virtual Reality (VR) technology and product maturity. VR is being used to enhance training in a number of areas including maintenance and operation of complex systems, but application of this technology to the training of dismounted soldiers has proven challenging. Fortunately, these advancements in VR technology now make possible the deve ...

    SBIR Phase II 2016 Department of DefenseOffice of the Secretary of Defense
  6. ViA-ML: A Machine Learning backed Visualization Assistant

    SBC: SCIENTIFIC SYSTEMS CO INC            Topic: OSD13LD1

    With the proliferation of cheap sensors, reduction in storage costs and the ubiquity of communication networks, Cyber-Physical Systems are collecting and storing data at an unprecedented rate. Analysis of such large databases is necessary to find relevant information and improve the efficiency of the Cyber Physical System. The goal of an analysis tool, simply put is to find the most interesting in ...

    SBIR Phase I 2014 Department of DefenseOffice of the Secretary of Defense
  7. Operators Context and Trust in Automation Visualization (OCTAV) Tool

    SBC: PACIFIC SCIENCE & ENGINEERING GROUP, INC.            Topic: OSD13HS5

    Pacific Science & Engineering Group (PSE) proposes to design, develop, and demonstrate a prototype human-autonomous system tool & #208;Operators Context and Trust in Automation Visualization (OCTAV) & #208; that will support improved transparency, trust, and human-machine team performance. OCTAV will automatically monitor human and autonomous system team context and task, visualize context-based s ...

    SBIR Phase I 2014 Department of DefenseOffice of the Secretary of Defense
  8. A Hybrid Systems Approach to Intelligent Information Management in Human-Automation Interaction

    SBC: OPTIMAL SYNTHESIS INC.            Topic: OSD13HS5

    A formal approach to the management of information involved in human-automation interactions is proposed. The mathematical formalism is enabled by employing the notion of hybrid systems. The information management involves ensuring correct information flow and shared cognition between human operators and machines. It is envisioned that the proposed algorithms will formalize the analysis of human-a ...

    SBIR Phase I 2014 Department of DefenseOffice of the Secretary of Defense
  9. Biometrics for Human-machine Team Feedback in Autonomous Systems

    SBC: TIAX LLC            Topic: OSD141AU1

    Use of Google Glass and add-ons to monitor warfighter state.

    SBIR Phase I 2014 Department of DefenseOffice of the Secretary of Defense
  10. Human-Centric Training and Assessment System for Cyber Situational Awareness

    SBC: Scalable Network Technologies, Inc.            Topic: OSD12T08

    The goal of the proposed work is to develop a human-centric training and assessment system for cyber situation awareness. The envisioned system will enable instructors to define training goals, design lesson plans, assign students roles in teams, and observe students performance, record events and interactions for scoring. The instructor/students can place tags (time or event) to roll back or repl ...

    STTR Phase II 2014 Department of DefenseOffice of the Secretary of Defense
US Flag An Official Website of the United States Government