You are here

Award Data

For best search results, use the search terms first and then apply the filters
Reset

The Award database is continually updated throughout the year. As a result, data for FY24 is not expected to be complete until March, 2025.

Download all SBIR.gov award data either with award abstracts (290MB) or without award abstracts (65MB). A data dictionary and additional information is located on the Data Resource Page. Files are refreshed monthly.

The SBIR.gov award data files now contain the required fields to calculate award timeliness for individual awards or for an agency or branch. Additional information on calculating award timeliness is available on the Data Resource Page.

  1. ICAM On-the-Fly

    SBC: CARDSMART TECHNOLOGIES, INC.            Topic: HSB0191002

    Trusted identification and provisioning of public safety individuals is extremely difficult during the chaos and time criticality of emergency response operations. Previously unknown individuals must be verified/vetted/provisioned without the benefit of a thorough face-to-face, manual review. The problem is made worse by the lack of a universally accepted system for identity sharing and coordinati ...

    SBIR Phase I 2019 Department of Homeland Security
  2. Cyber Risk Collaboration and Knowledge Tool (CRiCKeT)

    SBC: CARDSMART TECHNOLOGIES, INC.            Topic: HSB0191006

    Knowledge is empowering! Organizations equipped with timely cyber risk and defense knowledge are in a much better position to properly quantify and react to cyber risks. Surprisingly, many organizations are still poorly prepared with the needed information, experiences, and best practices to effectively combat sophisticated cyber threats.The Cyber Risk Collaboration & Knowledge Tool (CRiCKeT) is a ...

    SBIR Phase I 2019 Department of Homeland Security
  3. Improved Human Systems for Computed TomographySpeed of Image Review

    SBC: IDSS Holdings, Inc.            Topic: HSB0181006

    IDSS in partnership with Tufts University Human Factors Engineering Program, a leader in Engineering Phycology, proposes to study CT screening system operator burden and reduce image review time by reviewing and making improvements to the GUI and the current man-machine interaction and perform limited prototyping of potential improvement to the operator interface and toolset.

    SBIR Phase II 2019 Department of Homeland Security
  4. Next Generation Portable Power Amplifier

    SBC: MAXENTRIC TECHNOLOGIES LLC            Topic: SOCOM131004

    MaXentric proposes the GAU2x2 wideband power amplifier system. The design combines MaXentric’s wideband RF PA technology with advanced digital signal processing in a single small footprint package. This tight integration is made possible through the extremely high efficiency and low power dissipation. Since very little power is dissipated as heat, the package and heat sink size can be minimized. ...

    SBIR Phase II 2019 Department of DefenseSpecial Operations Command
  5. Explainable Query Refinement for Human Machine Teaming

    SBC: KITWARE INC            Topic: SOCOM18B001

    The Intelligence, Surveillance and Reconnaissance (ISR) analysts have a challenging task to extract useful information from huge volumes of data from various sources like Full Motion Video (FMV), Wide Area Motion Imagery (WAMI), satellite imagery, Synthetic Aperture Radar (SAR), and others. Modern Machine Learning (ML) algorithms based on deep learning have greatly advanced computer vision, speech ...

    STTR Phase I 2019 Department of DefenseSpecial Operations Command
  6. Firmware Automated Analysis at Scale with Testing

    SBC: RED BALLOON SECURITY, INC.            Topic: HSB0181008

    The firmware running on mobile, embedded, and Internet of things devices is often treated as a blackbox by organizations. These firmware images can contain a myriad of n-day vulnerabilities, both malicious and unintentional backdoors, and other unwanted functionality. Unfortunately, analyzing these firmware images is a difficult and time-consuming task as each firmware can be packed with layers of ...

    SBIR Phase II 2019 Department of Homeland Security
  7. Principled Security Analysis of the Firmware Binaries via Guaranteed Formal Verification and Scalable Dynamic Monitoring

    SBC: Sekurity LLC            Topic: HSB0181008

    Consequently, to protect the mobile/IoT platforms against complex security attacks, there is a need for effective analysis of mobile/IoT firmware. Such a solution is currently missing in the market. In this DHS SBIR effort, we will develop BINSEC, a mobile/IoT firmware binary security analysis framework. To ensure acceptable scalability, usability, and universality across different firmware binary ...

    SBIR Phase I 2018 Department of Homeland Security
  8. Improved Human Systems for Computed TomographySpeed of Image Review

    SBC: IDSS Holdings, Inc.            Topic: HSB0181006

    IDSS in partnership with Tufts University Human Factors Engineering Program, a leader in Engineering Phycology, proposes to study CT screening system operator burden and reduce image review time by reviewing the GUI and the current man-machine interaction, perform a cognitive and behavioral analysis of the interaction, perform a time an motion study and recommend and perform limited prototyping of ...

    SBIR Phase I 2018 Department of Homeland Security
  9. Mobile Network Resiliency Research and Development

    SBC: AKAMAI PHYSICS, INC.            Topic: 18OATS002

    There is a requirement to reduce the vulnerability of commercial voice and data networks. These vulnerabilities include cyber-attacks such as SS7, or that which would occur after an EMP event. The cellular network is also vulnerable to external monitoring and tracking. This effort will design, develop, and implement a resilient 4G LTE / First Net cellular capability. To accomplish this, the effort ...

    SBIR Phase II 2018 Department of Homeland Security
  10. Rogue Base Station Situational Awareness Reseach and Development

    SBC: AKAMAI PHYSICS, INC.            Topic: 18OATS003

    There is a critical need to detect rogue cellular tower base stations (fake cell towers).Rogue towers are a growing threat to the national cellular phone infrastructure.Initial exploratory tests using 2G and 3G GSM detectors discovered illegal cellular activity in the National Capital Region.Our effort will use both fixed and mobile methodologies to geo-locate rouge cell towers.This process to be ...

    SBIR Phase II 2018 Department of Homeland Security
US Flag An Official Website of the United States Government