You are here

Award Data

For best search results, use the search terms first and then apply the filters
Reset

The Award database is continually updated throughout the year. As a result, data for FY24 is not expected to be complete until March, 2025.

Download all SBIR.gov award data either with award abstracts (290MB) or without award abstracts (65MB). A data dictionary and additional information is located on the Data Resource Page. Files are refreshed monthly.

The SBIR.gov award data files now contain the required fields to calculate award timeliness for individual awards or for an agency or branch. Additional information on calculating award timeliness is available on the Data Resource Page.

  1. 9-1-1 Network Modeling Based Upon PARIDINE NIDE Model

    SBC: SECURELOGIX CORPORATION            Topic: HSB0191007

    SecureLogix is a current performer on the PARIDINE project and is focused on defining and detecting NIDEs such as Telephony Denial of Service (TDoS) and other call pattern-based attacks against 9-1-1 networks. Our approach is to enhance our cloud-based Call Authentication Service (CAS), extending its inherent authentication and spoofing detection capabilities, with the ability to use machine learn ...

    SBIR Phase I 2019 Department of Homeland Security
  2. Blockchain Forensic Analytics

    SBC: Integra FEC LLC            Topic: HSB0191008

    As blockchain technologies continue to evolve and emerge, DHS and numerous other Federal agencies have an increasing need to trace new cryptocurrencies and cryptotokens to support investigations and enforcement actions. Some new cryptocurrencies, such as Zcash and Monero, are designed to provide anonymity to users and thus pose challenges to enforcement agencies looking to track and curtail illici ...

    SBIR Phase I 2019 Department of Homeland Security
  3. Real-Time Passive Authentication for Contact Centers

    SBC: Illuma Labs Inc.            Topic: HSB0171003

    Vulnerabilities in telecommunications channels are being exploited at alarming rates by malicious attackers to commit fraud, perpetrate scams, and organize data breaches. In addition to financial losses incurred by corporations and taxpayers, attacks against government agencies such as the DHS can severely compromise national security. A common element of these attacks is the attacker's ability to ...

    SBIR Phase II 2019 Department of Homeland Security
  4. SBIR Proposal- Hybrid Analysis Mapping (HAM)

    SBC: DENIM GROUP, LTD.            Topic: HSB0131002

    Determine the feasibility of developing a system that can reliably and efficiently correlate and merge the results of open-source and commercial automated static and dynamic security scanning technologies, by creating common data structure standards for both automated static and dynamic security scanning results; research and prototype methods of matching the results of automated static and dynami ...

    SBIR Phase I 2013 Department of Homeland Security
  5. Physical Unclonable Functions for Mobile Device Roots of Trust

    SBC: DEF-LOGIX INC            Topic: HSB0132002

    Beginning with the release of the iPhone in 2007 and continuing with the increasing popularity of tablet computers, there has been an ever increasing desire to connect "unsecure" mobile devices to secure enterprise networks. Although several pieces of technology exist to meet this need, these devices lack a firm foundation upon which to build trust and security. This paper proposes development o ...

    SBIR Phase I 2013 Department of Homeland Security
US Flag An Official Website of the United States Government