Award Data

For best search results, use the search terms first and then apply the filters
Reset

The Award database is continually updated throughout the year. As a result, data for FY19 is not expected to be complete until September, 2020.

  1. Real-Time Passive Authentication for Contact Centers

    SBC: Illuma Labs Inc.            Topic: HSB0171003

    Vulnerabilities in telecommunications channels are being exploited at alarming rates by malicious attackers to commit fraud, perpetrate scams, and organize data breaches. In addition to financial losses incurred by corporations and taxpayers, attacks against government agencies such as the DHS can severely compromise national security. A common element of these attacks is the attacker's ability to ...

    SBIR Phase II 2019 Department of Homeland Security
  2. Multimode Chiroptical Spectrometer for Nanoparticle Characterization

    SBC: Applied Nanofluorescence LLC            Topic: None

    This project will develop a new scientific instrument optimized for the advanced characterization of near-infrared fluorescent nanoparticles that can exist as left- or right-handed structures (enantiomers). Single-walled carbon nanotubes (SWCNTs) are the leading current example of such nanomaterials. Applied NanoFluorescence, LLC (ANF) proposes a novel multi-mode chiroptical spectrometer that can ...

    SBIR Phase II 2019 Department of CommerceNational Institute of Standards and Technology
  3. Data-Driven Technology Discovery Methodologies

    SBC: Semandex Networks Inc.            Topic: DTRA162005

    During the Phase I effort, Semandex Networks and its team developed a prototype capability to detect trends in research publications by automatically identifying emerging concepts within the data. The implemented capability provides insights into past and

    SBIR Phase II 2019 Department of DefenseDefense Threat Reduction Agency
  4. Secure Email Agent Using the Domain Name System (DNS) as a Trust Infrastructure

    SBC: GRIER FORENSICS, LLC            Topic: 9020377R

    Although protocols for securing email have been available for over twenty years, these protocols, by nature of their use of asymmetric cryptography, require users to have the public key or certificate of the correspondents. Grier Forensics will develop technology to use the Domain Name System (DNS) to distribute certificates and keys, making email secure, authenticated, and confidential, curbing t ...

    SBIR Phase II 2015 Department of CommerceNational Institute of Standards and Technology
  5. Rapid Low-Cost Biological Warefare Decontamination

    SBC: Lynntech Inc.            Topic: HSB0142001

    Lynntech, Inc. proposes the use of a novel oxidant as a powdered concentrate, that when dissolved in water, yields a potent sporicidal solution capable of reducing spores by greater than 6-logs on a variety of surfaces. The sporicidal formulation will be tested on concrete, wood, galvanized metal, glass, plastic and painted wallboard to determine if the formulation will reduce spores but not harm ...

    SBIR Phase II 2015 Department of Homeland Security
  6. Detection of Texture Anomalies on the Ground (DTAG)

    SBC: Lynntech Inc.            Topic: HSB0141001

    Footprints trails left on unimproved roads during illegal border crossings are often useful starting places for Border Patrol Agents to begin their pursuits. Currently searching for footprints involves CBP agents driving over long stretches of road and visually searching for signs of human activities. In this technology and product development effort, Lynntech proposes to develop a COTS mobile-dev ...

    SBIR Phase II 2015 Department of Homeland Security
  7. Physical Unclonable Functions for Mobile Device Roots of Trust

    SBC: Def-Logix, Inc.            Topic: HSB0132002

    Beginning with the release of the iPhone in 2007 and continuing with the increasing popularity of tablet computers, there has been an ever increasing desire to connect "unsecure" mobile devices to secure enterprise networks. Although several pieces of technology exist to meet this need, these devices lack a firm foundation upon which to build trust and security. This paper proposes development o ...

    SBIR Phase II 2014 Department of Homeland Security
  8. SBIR Proposal- Hybrid Analysis Mapping (HAM)-- Phase 2

    SBC: DENIM GROUP, LTD.            Topic: HSB0131002

    Develop a system that can reliably and efficiently correlate and merge the results of open-source and commercial automated static and dynamic security scanning technologies, using common data structure standards for both automated static and dynamic security scanning results; building methods of matching the results of automated static and dynamic tools. The goal of Phase II will be to deliver a f ...

    SBIR Phase II 2014 Department of Homeland Security
  9. Laser Direct Deposition Applied to the Manufacturing of Bulk, Net Shaped Metallic Glasses

    SBC: NANOHMICS INC            Topic: DTRA11003

    We propose to develop reactive composite materials with sufficient strength and stiffness to serve as structural components for penetrating weapons and other munitions. The composites will consist of two materials that react with each other, in either oxidation-reduction (such as in a thermite) or bimetallic reactions. One component will be in the form of fiber, wire, or wire-mesh, within a bondin ...

    SBIR Phase II 2014 Department of DefenseDefense Threat Reduction Agency
  10. ANALYSIS OF HANE 0-10 SECOND MHD EMP

    SBC: AUSTIN RESEARCH ASSOCIATES            Topic: N/A

    MODELING OF THE AMBIENT AND PROMPT IONOSPHERIC REGIONS IN A THIN LAYER APPROXIMATION ALLOWS AN EFFICIENT METHOD OF DETERMINING THE TIME EVOLUTION, PROPAGATION, AND SIGNAL STRENGTH OF THE 0-10 SECOND MHD EMP ASSOCIATED WITH HIGH ALTITUDE NUCLEAR DETONATIONS.

    SBIR Phase II 1987 Department of DefenseDefense Threat Reduction Agency
US Flag An Official Website of the United States Government