List

For best search results, use the search terms first and then apply the filters
Reset

The Award database is continually updated throughout the year. As a result, data for the given year is not complete until April of the following year. Annual Reports data is a snapshot of agency reported information for that year and hence might look different from the live data in the Awards Information charts.

  1. A Scalable, Mobile M2M/SDP/IoT Architecture to Connect First Responders at the Incident Site

    SBC: BALFOUR TECHNOLOGIES LLC            Topic: HSB0141005

    First Responders need to leverage automated (M2M machine-to-machine), mobile connectivity at an incident site. With connectivity automated through M2M network technology, responders would have much improved situational awareness, and can effectively focus their complete attention on the necessary emergency response actions. We propose to develop a futuristic automated M2M prototype system/architec ...

    SBIR Phase II 2015 Department of Homeland Security
  2. NEXT GENERATION SCALABLE SOLID STATE THERMAL NEUTRON DETECTOR

    SBC: Solid State Detection Devices, LLC            Topic: HSB0151009

    Solid State Detection Devices LLC proposes to develop a new commercially viable next generation thermal neutron detecting system based on well established silicon integrated circuit technology. Hexagonal holes in honeycomb fashion with depth greater than 50 microns and vertical side walls will be fabricated on bulk silicon wafers of right conductivity using a combination of deep reactive ion etchi ...

    SBIR Phase I 2015 Department of Homeland Security
  3. Automated Embedded Vulnerability Identification and Exploitation Mitigation System Using FRAK, Symbiote and Autotomic Binary Structure Randomization

    SBC: Red Balloon Security, Inc.            Topic: HSB0142002

    We propose to implement a novel Embedded Live-Hardening framework and associated algorithms to combine the state-of-the-art in static firmware vulnerability analysis and mitigation with a suite of novel dynamic defensive techniques powered by Red Balloon Security's software Symbiote technology. While Symbiotes have traditionally been used directly to enforce dynamic firmware integrity attestation ...

    SBIR Phase II 2015 Department of Homeland Security

Agency Micro-sites

SBA logo
Department of Agriculture logo
Department of Commerce logo
Department of Defense logo
Department of Education logo
Department of Energy logo
Department of Health and Human Services logo
Department of Homeland Security logo
Department of Transportation logo
Environmental Protection Agency logo
National Aeronautics and Space Administration logo
National Science Foundation logo
US Flag An Official Website of the United States Government