You are here

Award Data

For best search results, use the search terms first and then apply the filters
Reset

The Award database is continually updated throughout the year. As a result, data for FY24 is not expected to be complete until March, 2025.

Download all SBIR.gov award data either with award abstracts (290MB) or without award abstracts (65MB). A data dictionary and additional information is located on the Data Resource Page. Files are refreshed monthly.

The SBIR.gov award data files now contain the required fields to calculate award timeliness for individual awards or for an agency or branch. Additional information on calculating award timeliness is available on the Data Resource Page.

  1. Power Generation and Storage for Micro Aerial Vehicles (MAV)

    SBC: CYVOLT ENERGY SYSTEMS, INC.            Topic: OSD09EP2

    This Phase I innovation research project will develop a fuel cell/battery hybrid system to power and store energy for micro-aerial vehicles (MAVs). The objective of this small business innovation research project is to develop a hybrid power system capable of powering MAVs for extended flight times as well as providing increased power for payload packages. Current battery technologies are unable ...

    SBIR Phase I 2009 Department of DefenseAir Force
  2. Real-time Adversarial Characterization and Adaptive Software Protection Countermeasures

    SBC: SICORE TECHNOLOGIES INC.            Topic: OSD09IA1

    Rather than continuing to approach cyber security problems in a reactive fashion, ASD proposes to move to a proactive posture; anticipating and eliminating vulnerabilities while also being prepared to effectively and rapidly defend against attacks. Our approach collects data about the attacker as well as the attack, which it processes in real time. The data (observations) is then used by our prote ...

    SBIR Phase I 2009 Department of DefenseAir Force
  3. Countering Covert Access with SecureCore

    SBC: ASSURED INFORMATION SECURITY, INC.            Topic: OSD09IA2

    The x86 architecture’s inherent security model has a very large attack surface due to the fact that a large amount of software runs in a privileged level and has unfettered access to critical system state. Software used for data piracy or exfiltration, stealthy execution, malicious alteration of critical information, or control of network end-nodes takes advantage of this large attack surface to ...

    SBIR Phase I 2009 Department of DefenseAir Force
  4. Software Protection to Fight through an Attack

    SBC: GRAMMATECH INC            Topic: OSD09IA3

    New vulnerabilities and attacks on software applications and the underlying systems are discovered daily. Most security research focuses on detection of attacks--typically, by monitoring the execution of an application and detecting anomalous behavior. Little attention has been paid to how an application should respond to an attack. Generally, it is assumed that the application under attack is te ...

    SBIR Phase I 2009 Department of DefenseAir Force
  5. High-Performance Fuels

    SBC: Orbital Technologies Corporation            Topic: AF06194

    ORBITEC proposes to continue the development of high-performance fuels to replace monomethyl hydrazine (MMH) and other storable fuels for in-space propulsion applications. Compounds from various chemical families were proposed in Phase I to address these needs. These families of compounds have greater heats of formation, lower volatility, and lower toxicity than MMH. Their reduced vapor pressur ...

    SBIR Phase II 2009 Department of DefenseAir Force
  6. Improved magneto-optic methods for aircraft corrosion detection

    SBC: Quest Integrated, LLC            Topic: AF073118

    ABSTRACT: Corrosion under multi-layer structures is a significant problem for the Air Force. The ability to detect this corrosion rapidly over a large area is also very important. The Magneto-Optic Imager (MOI) is an eddy current visualization tool that has been accepted in the market and has demonstrated the ability to rapidly inspect large areas. The principle application of the MOI within t ...

    SBIR Phase II 2009 Department of DefenseAir Force
  7. Field Sensor for Measuring Total Trihalomethanes (TTHM) Concentrations in Drinking Water

    SBC: AGAVE BIOSYSTEMS INC.            Topic: AF073139

    Rapid detection of the total trihalomethanes (TTHM) in treated drinking water is essential for compliance with the Environmental Protection Agency’s (EPA) Stage 2 Disinfectants and Disinfection Byproducts (DBP) Rule, which limits the maximum contaminant level of TTHM in drinking water. The current detection method for TTHM determination involves sending samples to EPA certified laboratories for ...

    SBIR Phase II 2009 Department of DefenseAir Force
  8. Aeroelastic Model Updating

    SBC: CLEAR SCIENCE CORP            Topic: AF073142

    Clear Science Corp. proposes to develop Aeroelastic Model Updating (AMU) software that enables safer, more efficient and accurate flutter testing of military aircraft. Aircraft certification involves a battery of expensive and sometimes risky flight tests. The proposed tool will reduce costs by reducing required hours of flutter testing and will reduce risk by providing supplemental aeroelastic- ...

    SBIR Phase II 2009 Department of DefenseAir Force
  9. High Temperature Permanent Magnet Actuator Motor

    SBC: SPRUNG-BRETT RDI, INC.            Topic: AF081058

    This proposal describes a novel approach in the design and development of a high temperature resistant electric motor for aerospace actuation applications. A biomorphical inspired adaptive achitecture was conceptualized in Phase I and is proposed to be futher explored in detail in Phase II. BENEFIT: This research and development program explores the concept of adaptive architecture in respon ...

    SBIR Phase II 2009 Department of DefenseAir Force
  10. Software Partitioning for Protecting High-Performance Code

    SBC: Reservoir Labs, Inc.            Topic: OSD08IA1

    Critical technology is increasingly encoded as software, exposing it to risk of loss when deployed on platforms in hostile environments. Because of this, special anti-tamper hardware may be incorporated into a device to prevent access to the software. The platform may also include insecure hardware resources, due to reasons of cost or power. There is a need to structure software in such a way that ...

    SBIR Phase II 2009 Department of DefenseAir Force
US Flag An Official Website of the United States Government