You are here

Award Data

For best search results, use the search terms first and then apply the filters
Reset

The Award database is continually updated throughout the year. As a result, data for FY24 is not expected to be complete until March, 2025.

Download all SBIR.gov award data either with award abstracts (290MB) or without award abstracts (65MB). A data dictionary and additional information is located on the Data Resource Page. Files are refreshed monthly.

The SBIR.gov award data files now contain the required fields to calculate award timeliness for individual awards or for an agency or branch. Additional information on calculating award timeliness is available on the Data Resource Page.

  1. Improved Human Systems for Computed TomographySpeed of Image Review

    SBC: IDSS Holdings, Inc.            Topic: HSB0181006

    IDSS in partnership with Tufts University Human Factors Engineering Program, a leader in Engineering Phycology, proposes to study CT screening system operator burden and reduce image review time by reviewing and making improvements to the GUI and the current man-machine interaction and perform limited prototyping of potential improvement to the operator interface and toolset.

    SBIR Phase II 2019 Department of Homeland Security
  2. Decision Support Toolkits for Sytem of Systems Level Risk Modeling

    SBC: MICHIGAN ENGINEERING SERVICES LLC            Topic: 19OATS002

    DHS is preserving the safety and the security of America by preventing, foiling, and defeating attacks from a variety of adversaries. The increasing threats (both in terms of numbers and in terms of abilities) must be addressed successfully while facing an austere budget environment. In order to be able to "do more with less" having a capability for optimizing the resources and the assets which ar ...

    SBIR Phase II 2019 Department of Homeland Security
  3. Firmware Automated Analysis at Scale with Testing

    SBC: RED BALLOON SECURITY, INC.            Topic: HSB0181008

    The firmware running on mobile, embedded, and Internet of things devices is often treated as a blackbox by organizations. These firmware images can contain a myriad of n-day vulnerabilities, both malicious and unintentional backdoors, and other unwanted functionality. Unfortunately, analyzing these firmware images is a difficult and time-consuming task as each firmware can be packed with layers of ...

    SBIR Phase II 2019 Department of Homeland Security
  4. Augmented Commercial Radio for Navigation (ACORN)

    SBC: SETTER RESEARCH INC            Topic: HSB0181004

    The Global Positioning System (GPS) and other global navigation satellite systems (GNSS) are the critical providers of position, navigation, and time (PNT) information to an almost uncountable number of users and applications. Widespread dependence on GPS has led to awareness that GPS data availability is a single point of failure for many systems and applications. In addition, GPS signals are ver ...

    SBIR Phase II 2019 Department of Homeland Security
  5. Internet of RAD Things: Multi-Detector Edge Intelligence for Integrated Sensor Networks

    SBC: BLUEYEQ LLC            Topic: HSB0191009

    BluEyeQ LLC and Los Alamos National Laboratory are pleased to propose an interoperable network of Internet of Things (IoT) enabledradiation detectors.With the emergence of high performance, low cost networking equipment and Big Data cloud analytics, the opportunityexists to harness the vision and intelligence available from distributed sensor data.Our proposal demonstrates a path to modernize past ...

    SBIR Phase I 2019 Department of Homeland Security
  6. IP Hopper (for Moving Target Defense)

    SBC: CYBERNET SYSTEMS CORPORATION            Topic: HSB0121002

    The IP Hopper is a moving target defense system that will use available network data and hopping algorithms to allow for constant IP address changing of both source and destination IP addresses. The use of "hopping" IP addresses will severely diminish an attacker's ability to attack any one target within a network. Utilizing IPv6 the IP Hopper will allow up to 340 undecillion (3.4 x 10 to the 38 ...

    SBIR Phase I 2012 Department of Homeland Security
  7. COTS MMW Radar for Tracking Persons within a Security Perimeter

    SBC: PSQUAREDT LLC            Topic: HSB0121005

    The implications of the proposed investigations are that radar systems already implemented for the automotive industry can be exploited, adapted and optimized for this application. These radar systems are inexpensive, of small size, employ advanced processing techniques which allow the tracking of threat targets, transmit low average power (10 milliwatts) and are proven to be people safe. We will ...

    SBIR Phase I 2012 Department of Homeland Security
  8. A Novel Fractionation and Concentration System for Improved Biological Detection

    SBC: INNOVAPREP LLC            Topic: HSB0111002

    Detection of bioaerosols is a cornerstone in the protection of our nation from bioterrorist and pandemic events. Rapid bioaerosol detection systems have advanced dramatically in recent years, but the lack of integratable automated sample preparation for these systems remains a major deficiency. Three significant issues are (a) a lack of an interface between large environmental samples and sample p ...

    SBIR Phase II 2012 Department of Homeland Security
  9. Arden

    SBC: ATC-NY INC            Topic: HSB0122001

    Solid-state storage media, particularly solid-state drives (SSDs), present new challenges to forensic investigation that need to be addressed. The low-level behavior of these drives is dramatically different than for mechanical hard disk drives-including what low-level data is available, how that data is obtained, and how that data is interpreted. Interpreting low-level data is a useful tool in co ...

    SBIR Phase I 2012 Department of Homeland Security
  10. Automatic Threat Recognition Algorithm for Volumetric CT Data

    SBC: Telesecurity Sciences, Inc.            Topic: HSB0122002

    This Phase I proposal describes the development of an Automatic Threat Recognition (ATR) algorithm for volumetric CT data. Our ATR algorithm consists of four stages: (1) preprocessing of CT data, (2) object segmentation of preprocessed CT data, (3) post-processing of segmentation results, and (4) explosive detection from the segmented objects. The ATR algorithm will be made computationally efficie ...

    SBIR Phase I 2012 Department of Homeland Security
US Flag An Official Website of the United States Government