Award Data

For best search results, use the search terms first and then apply the filters
Reset

The Award database is continually updated throughout the year. As a result, data for FY19 is not expected to be complete until September, 2020.

  1. Preventing Program Hijacking via Static and Dynamic Analyses

    SBC: Zephyr Software, LLC            Topic: OSD11IA5

    To hijack the execution of a program, an attacker must overwrite the value of a return address or a function pointer (broadly defined). To prevent program hijacking, our product will provide a layered defense of these two targets, including deterministic and randomization defenses, with the ability in many cases to continue execution after a hijacking attempt is prevented. Our product toolkit incl ...

    SBIR Phase II 2014 Department of DefenseOffice of the Secretary of Defense
  2. Autonomous Sensing and Deciding Framework Processor

    SBC: BLACK RIVER SYSTEMS COMPANY INC            Topic: OSD12LD1

    Our objective is to develop an innovative cognitive knowledge-aided information processing framework to take very high rate intelligence data streams over wide areas and autonomously highlight Areas-of-Interest (AOIs) and targets for the image analyst without a priori knowledge of the area or location of the individual high interest targets. By using 100s of JADE based intelligent agents in Phase ...

    SBIR Phase II 2014 Department of DefenseOffice of the Secretary of Defense
  3. Event Attribute Recognition and Labeling (EARL)

    SBC: DECISIVE ANALYTICS CORPORATION            Topic: OSD12LD5

    Existing information extraction technology can only partially address the problem of exploiting unreadably-large amounts text. When discussion of events is limited to simple, past-tense, factual descriptions of events, current NLP-based systems can ident

    SBIR Phase II 2014 Department of DefenseOffice of the Secretary of Defense
  4. Multi-Abstractions System Reasoning Infrastructure toward Achieving Adaptive Computing Systems

    SBC: Grammatech, Inc.            Topic: OSD12IA2

    A modern computer system consists of a complex combination of applications cooperating with the operating system and each other to accomplish a mission. Components of the system are subject to disruption from accidental malfunctions and deliberate attacks

    SBIR Phase II 2014 Department of DefenseOffice of the Secretary of Defense
  5. Active Software Defense to Reduce Threat Capability Effectiveness

    SBC: Power Fingerprinting, Inc            Topic: OSD11IA6

    In order to better protect critical infrastructure from cyber attacks, perimeter and passive defenses must be complemented with an active defense mechanism which elevates the risks, or costs, a potential attacker will face. The effectiveness of an active defense mechanism, however, is ultimately limited by its ability to detect threats fast, accurately, and reliably. For this Phase II project, we ...

    SBIR Phase II 2014 Department of DefenseOffice of the Secretary of Defense
  6. Fashioning of an Adaptive Workspace through Autonomous Services

    SBC: SECURBORATION, INC.            Topic: OSD12AU5

    During Phase I of this research, the Securboration Team prototyped the Adaptive Data Immersion ENvironment (ADIEN) and demonstrated groundbreaking capability in adaptive human machine collaboration one in which the computer learns, adapts, and informs analysts based on their practices, situational context, and data content. ADIEN provides a unique and innovative system that is data centric in ter ...

    SBIR Phase II 2014 Department of DefenseOffice of the Secretary of Defense
  7. Decision Support for Anomaly Detection and Recovery for Unmanned System (ADRUS)

    SBC: Knexus Research Corp.            Topic: OSD12AU1

    Deployment of unmanned systems continues to expand across a wide range of missions; for example, logistics and resupply missions, force application and protection, and improving battlespace awareness. Presently these unmanned systems run at the lowest of four possible levels of autonomy, that is, in a teleoperated mode, and each system typically requires multiple operators. To address this proble ...

    SBIR Phase II 2014 Department of DefenseOffice of the Secretary of Defense
  8. N/A

    SBC: 21ST CENTURY SYSTEMS, INC.            Topic: N/A

    N/A

    SBIR Phase II 1999 Department of DefenseOffice of the Secretary of Defense
  9. N/A

    SBC: AZIMUTH, INC            Topic: N/A

    N/A

    SBIR Phase II 1999 Department of DefenseOffice of the Secretary of Defense
  10. N/A

    SBC: STEADFAST TECHNOLOGIES            Topic: N/A

    N/A

    SBIR Phase II 1999 Department of DefenseOffice of the Secretary of Defense
US Flag An Official Website of the United States Government