You are here

Award Data

For best search results, use the search terms first and then apply the filters
Reset

The Award database is continually updated throughout the year. As a result, data for FY24 is not expected to be complete until March, 2025.

Download all SBIR.gov award data either with award abstracts (290MB) or without award abstracts (65MB). A data dictionary and additional information is located on the Data Resource Page. Files are refreshed monthly.

The SBIR.gov award data files now contain the required fields to calculate award timeliness for individual awards or for an agency or branch. Additional information on calculating award timeliness is available on the Data Resource Page.

  1. Code Ray: Software Assurance Risk Management Framework for Hybrid Analysis Mapping

    SBC: APPLIED VISIONS, INC.            Topic: HSB0131002

    Secure Decisions is developing a software assurance risk management technology called "Code Ray" to: (1) Improve the speed, accuracy and confidence in detection of vulnerabilities by cross-mapping and normalizing the output of hybrid application security testing (HAST) techniques -- dynamic analysis, dynamic tracing, static analysis and contextual analysis. (2) Enhance prioritization and mitigatio ...

    SBIR Phase II 2014 Department of Homeland Security
  2. A Scalable, Mobile Layer-1 M2M Architecture to Connect First Responders at the Incident Site

    SBC: BALFOUR TECHNOLOGIES LLC            Topic: HSB0141005

    First Responders need to leverage automated (M2M machine-to-machine), mobile connectivity at an incident site. With connectivity automated through M2M network technology, responders would have much improved situational awareness, and can effectively focus their complete attention on the necessary emergency response actions. We propose to develop a futuristic automated M2M device mesh and concept o ...

    SBIR Phase I 2014 Department of Homeland Security
  3. GenPatcher: Automatically Evolving Invulnerable Systems

    SBC: GRAMMATECH INC            Topic: HSB0142002

    Modern civilization relies on a network of embedded devices that are (i) riddled with security vulnerabilities and (ii) remotely hackable. Unfortunately, there seems to be near universal neglect for ensuring the security of these devices. Moreover, the existing IT solutions, such as antivirus software and intrusion-detection systems, do not provide substantial benefits for protection of embedded s ...

    SBIR Phase I 2014 Department of Homeland Security
  4. Software Assurance Analysis and Visual Analytics- CRPP

    SBC: APPLIED VISIONS, INC.            Topic: HSB092004

    Under our Phase II SBIR we developed a compelling new technology for software assurance called Code Dx. We used initial feedback from government agencies and industry experts, collected during beta testing and Version 1.0 evaluations, to produce Version 1.1 which is technically mature and ready for trial evaluations and sale. However, the path to commercial success requires more than technical cap ...

    SBIR Phase II 2014 Department of Homeland Security
  5. A Generic Cross-Platform Perception API for Unmanned Vehicles

    SBC: Honeybee Robotics, Ltd.            Topic: OSD13HS4

    ABSTRACT: Autonomous vehicles lack a standardized mechanism for seamless cross-platform sharing of testing frameworks and evaluations of basic tasks. The ability to execute common tests on various hardware platforms is essential in order to be able to e

    SBIR Phase I 2014 Department of DefenseDefense Threat Reduction Agency
  6. Automated Embedded Vulnerability Identification and Exploitation Mitigation System Using FRAK, Symbiote and Autotomic Binary Structure Randomization

    SBC: RED BALLOON SECURITY, INC.            Topic: HSB0142002

    We propose to design a novel framework and associated algorithms to combine the state-of-the-art in static firmware vulnerability analysis and mitigation with a suite of novel dynamic defensive techniques powered by Red Balloon Security's software Symbiote technology. While Symbiotes have traditionally been used directly to enforce dynamic firmware integrity attestation in embedded devices, we pro ...

    SBIR Phase I 2014 Department of Homeland Security
  7. Landscape vulnerability maps for rare dangerous events

    SBC: Applied Biomathematics Inc            Topic: N/A

    To apportion resources wisely, decision makers need to estimate the location and importance of threats and vulnerabilities at local, regional, and national landscape levels. Dynamic, high quality, geographically explicit data are becoming more and more available for use as inputs to such predictions. However, methods are required for analyzing this data and producing maps of the likelihood of seve ...

    SBIR Phase I 2008 Department of Homeland Security
  8. Agent Defeat using a DWA Accelerator

    SBC: BROOKHAVEN TECHNOLOGY GROUP INC            Topic: DTRA08008

    A new type of compact induction accelerator currently under development at the Lawrence Livermore National Laboratory (LLNL) promises to increase the average accelerating gradient by at least an order of magnitude over that of existing induction machines. The machine is based on the use of high gradient vacuum insulators and advanced dielectric materials and switches. The system, called the Diel ...

    SBIR Phase I 2008 Department of DefenseDefense Threat Reduction Agency
  9. Engineering Models for Damage to Structural Components Subjected to Internal Blast Loading

    SBC: Thornton Tomasetti, Inc.            Topic: DTRA08006

    Predicting the response of building components to internal detonations is more complex than the corresponding task for external loads because of the more complex loading waveforms which include multiple reflections in the shock phase followed by a long duration pseudostatic loading that depends upon room venting. Add the possibility of additional impulsive loading from primary debris. We propose t ...

    SBIR Phase I 2008 Department of DefenseDefense Threat Reduction Agency
  10. Novel Methods to Measure Penetrator Dynamics in Multi-Layer Geometries

    SBC: Thornton Tomasetti, Inc.            Topic: DTRA07011

    In Phase I of this effort we analyzed the structural response of a BLU 109 during typical penetration events. Based on these finite element results, we proposed and demsonstrated a simple robust concept for a passive penetrator sensor that identifies the material being penetrated and also correlates strongly with its underground trajectory. Such a sensor would obviously provide valuable informatio ...

    SBIR Phase II 2008 Department of DefenseDefense Threat Reduction Agency
US Flag An Official Website of the United States Government