You are here
Award Data
The Award database is continually updated throughout the year. As a result, data for FY24 is not expected to be complete until March, 2025.
Download all SBIR.gov award data either with award abstracts (290MB)
or without award abstracts (65MB).
A data dictionary and additional information is located on the Data Resource Page. Files are refreshed monthly.
The SBIR.gov award data files now contain the required fields to calculate award timeliness for individual awards or for an agency or branch. Additional information on calculating award timeliness is available on the Data Resource Page.
-
Fusing Uncertain and Heterogeneous Information Making Sense of the Battlefield
SBC: Veloxiti, Inc. Topic: OSD12LD2The militarys increasingly capable net-centric environment offers clear benefits and undeniable challenges. Due to the development of new sensor platforms and sensor technologies, physics-based information capabilities have increased but limitations on human/system exploitation capabilities have limited sensor tasking such that these capabilities are underutilized. IF there were enough people and ...
SBIR Phase II 2014 Department of DefenseOffice of the Secretary of Defense -
Event Attribute Recognition and Labeling (EARL)
SBC: DECISIVE ANALYTICS CORPORATION Topic: OSD12LD5Existing information extraction technology can only partially address the problem of exploiting unreadably-large amounts text. When discussion of events is limited to simple, past-tense, factual descriptions of events, current NLP-based systems can ident
SBIR Phase II 2014 Department of DefenseOffice of the Secretary of Defense -
Active Software Defense to Reduce Threat Capability Effectiveness
SBC: Power Fingerprinting, Inc Topic: OSD11IA6In order to better protect critical infrastructure from cyber attacks, perimeter and passive defenses must be complemented with an active defense mechanism which elevates the risks, or costs, a potential attacker will face. The effectiveness of an active defense mechanism, however, is ultimately limited by its ability to detect threats fast, accurately, and reliably. For this Phase II project, we ...
SBIR Phase II 2014 Department of DefenseOffice of the Secretary of Defense -
Preventing Program Hijacking via Static and Dynamic Analyses
SBC: ZEPHYR SOFTWARE LLC Topic: OSD11IA5To hijack the execution of a program, an attacker must overwrite the value of a return address or a function pointer (broadly defined). To prevent program hijacking, our product will provide a layered defense of these two targets, including deterministic and randomization defenses, with the ability in many cases to continue execution after a hijacking attempt is prevented. Our product toolkit incl ...
SBIR Phase II 2014 Department of DefenseOffice of the Secretary of Defense -
Decision Support for Anomaly Detection and Recovery for Unmanned System (ADRUS)
SBC: KNEXUS RESEARCH LLC Topic: OSD12AU1Deployment of unmanned systems continues to expand across a wide range of missions; for example, logistics and resupply missions, force application and protection, and improving battlespace awareness. Presently these unmanned systems run at the lowest of four possible levels of autonomy, that is, in a teleoperated mode, and each system typically requires multiple operators. To address this proble ...
SBIR Phase II 2014 Department of DefenseOffice of the Secretary of Defense -
Remote Automated Atmospherics Monitoring and Prediction System
SBC: North Dancer Labs, Inc. Topic: N/AN/A
SBIR Phase II 1996 Department of DefenseOffice of the Secretary of Defense