You are here
Award Data
The Award database is continually updated throughout the year. As a result, data for FY24 is not expected to be complete until March, 2025.
Download all SBIR.gov award data either with award abstracts (290MB)
or without award abstracts (65MB).
A data dictionary and additional information is located on the Data Resource Page. Files are refreshed monthly.
The SBIR.gov award data files now contain the required fields to calculate award timeliness for individual awards or for an agency or branch. Additional information on calculating award timeliness is available on the Data Resource Page.
-
Data Sandboxing for Software Binaries
SBC: GRAMMATECH INC Topic: SB173003Data-rich applications, such as web servers, web browsers, and document editors, are inherently vulnerable to non-control data attacks, i.e., attacks that exploit memory corruption vulnerabilities to leak or corrupt sensitive data. We propose Dobby, a tool that statically transforms software binaries to integrate run-time checks ensuring illicit data flows caused by memory corruption errors in the ...
SBIR Phase I 2018 Department of DefenseDefense Advanced Research Projects Agency -
Processes for Fabrication of Atomically Precise Strongly Correlated Materials
SBC: XALLENT INC. Topic: ST17C002Developing knowledge-driven nanoelectronics for military applications requires understanding the fundamental physics that governs the behavior of the underlying materials. Strongly correlated materials have very desirable properties such as interfacial superconductivity, ferroelectricity, ferromagnetism, and huge magnetoresistance, which make them an ideal set of candidates to integrate with semic ...
STTR Phase I 2018 Department of DefenseDefense Advanced Research Projects Agency -
New Platform Technologies for Viral and Therapeutic Evolution Assays
SBC: AUTONOMOUS THERAPEUTICS INC Topic: SB171003From HIV to metastatic cancer, state-of-the-art therapeutics are static biological or pharmaceutical compounds—whose efficacy is inevitably lost once their evolving disease targets sufficiently mutate. We engineered the first adaptive therapeutics designed to co-adapt with adapting disease agents—to provide ‘resistance-proof’ disease control. Known as Therapeutic Interfering Particles (‘ ...
SBIR Phase II 2018 Department of DefenseDefense Advanced Research Projects Agency -
Adaptive Control and Advanced Sensing for Turbine Based Combined Cycle Vehicles
SBC: Innoveering, LLC Topic: SB171014Development of air vehicles capable of routine operation and able to achieve hypersonic speeds is paced by the availability of a propulsion system. The vision is to combine improved off-the-shelf turbines for low-speed operation (M=0 to 2+) and dual-mode ramjet (DMSJ) engine technologies for high-speed operation (M=2+ to 5+), with both engines sharing a common air inlet and a common thrust produci ...
SBIR Phase II 2018 Department of DefenseDefense Advanced Research Projects Agency -
Query-based Plug and Play Analysis and Simulation
SBC: INTACT SOLUTIONS, INC Topic: SB172005The goal of this SBIR project is to demonstrate a general and scalable plug-and-play query-based solution to CAD-CAE and CAE-CAE interoperability problems. The approach is based on the following two observations: (1) the geometric, topological, and material information in any CAD model may be abstracted by a finite collection of queries -- formally defined and algorithmically implemented computabl ...
SBIR Phase I 2018 Department of DefenseDefense Advanced Research Projects Agency -
Identification and Modification of Features in Embedded Devices
SBC: RED BALLOON SECURITY, INC. Topic: SB0142002Unlike conventional computers, the embedded computers found in vehicles, routers and other Internet of Things devices lack the capability to have their software remotely updated. Vulnerabilities discovered in such devices remain unpatched, creating a large and growing attack surface. We propose to address this limitation in our Identification and Modification of Features in Embedded Devices (IMFED ...
SBIR Phase II 2018 Department of DefenseDefense Advanced Research Projects Agency -
Secure Software Components Leveraging the seL4 Microkernel
SBC: Critical Technologies Inc Topic: SB151003The overall objective of this topic is to build applications that expand the ecosystem of secure software components around the seL4 operating system microkernel. The CTI/SU teams interpretation of this is broad, including an application primarily as a demonstration of the utility of a more fundamental expansion of the ecosystem: to release to the community, as open source, a minimized Trusted Com ...
SBIR Phase II 2015 Department of DefenseDefense Advanced Research Projects Agency -
Visual Representation of Cyber Defense Situational
SBC: APPLIED VISIONS, INC. Topic: N/AApplied Visions, Inc. (AVI) proposes to develop visualization aids to enhance the situational awareness of information assurance analysts regarding: 1) temporal changes in cyber security events, and 2) the impact of cyber security events (e.g. probes,intrusions) on mission-critical tasks (e.g. ATO generation; preparation of Mission Situation Reports). The visualization aids will operate on a Wind ...
SBIR Phase I 2001 Department of DefenseDefense Advanced Research Projects Agency -
Visual Representation of Cyber Defense Situational
SBC: APPLIED VISIONS, INC. Topic: N/AApplied Visions, Inc. (AVI) proposes to develop visualization aids to enhance the situational awareness of information assurance analysts regarding: 1) temporal changes in cyber security events, and 2) the impact of cyber security events (e.g. probes,intrusions) on mission-critical tasks (e.g. ATO generation; preparation of Mission Situation Reports). The visualization aids will operate on a Wind ...
SBIR Phase II 2001 Department of DefenseDefense Advanced Research Projects Agency -
Efficient Code Certification for Open Firmware
SBC: ATC-NY INC Topic: N/AMaliciously constructed boot firmware is a threat to our information infrastructure that has largely been ignored. Boot firmware controls the power-up procedure initializing a computer's hardware and loading its run-time system. This code, embedded inall third-party peripheral devices, can easily be corrupted and then exploited to undermine security engineering at the operating system, protocol, ...
SBIR Phase I 2001 Department of DefenseDefense Advanced Research Projects Agency