You are here

Award Data

For best search results, use the search terms first and then apply the filters
Reset

The Award database is continually updated throughout the year. As a result, data for FY24 is not expected to be complete until March, 2025.

Download all SBIR.gov award data either with award abstracts (290MB) or without award abstracts (65MB). A data dictionary and additional information is located on the Data Resource Page. Files are refreshed monthly.

The SBIR.gov award data files now contain the required fields to calculate award timeliness for individual awards or for an agency or branch. Additional information on calculating award timeliness is available on the Data Resource Page.

  1. SAFARI: Scalable Analysis of Firmware for AndRoid and IOS

    SBC: KRYPTOWIRE, LLC            Topic: HSB0181008

    To address the supply chain threats that stem from vulnerable or malicious software distributed through firmware on mobile and IoT devices via binary firmware images, we propose a scalable, comprehensive, and automated framework to detect firmware-borne threats, both malicious and (un)intentionally insecure, present in Android and iOS devices. We use a workflow encompassing three analysis techniqu ...

    SBIR Phase II 2019 Department of Homeland Security
  2. LMR-P25 and LTE Mission Critical Push to Talk Interface Service

    SBC: CATALYST COMMUNICATIONS TECHNOLOGIES, INC.            Topic: HSB0181005

    In Phase I, Catalyst proved the feasibility of an Interworking solution for LTE Mission Critical Push-to-Talk (MCPTT) and Land Mobile Radio (LMR) systems that meets the requirements of Public Safety as documented in the National Public Safety Telecommunications Council Public Safety LMR Interoperability with LTE Mission Critical Push to Talk report. In Phase II, we will combine innovations created ...

    SBIR Phase II 2019 Department of Homeland Security
  3. RadioNuclide Threat Tracking System (RNTTS)

    SBC: DEEP ANALYTICS LLC            Topic: HSB0181010

    The integration of radiological and nuclear (RN) sensors with commercial video management systems (VMSs) would greatly enhance DHS/CWMD's ability to fulfill its mission. To demonstrate the value of integrating RN sensors with existing VMSs, DA proposes the RadioNuclide Threat Tracking System (RNTTS). RNTTS interfaces with existing RN sensors and uses cutting-edge machine learning (ML) algorithms t ...

    SBIR Phase II 2019 Department of Homeland Security
  4. Test & Evaluation Data Archival Repository (TEDAR) – Phase II

    SBC: ArchSmart, LLC            Topic: 121007

    TEDAR is an intuitive archival database and interfacing system that will serve as a centralized repository for results from testing and evaluation (T&E), modeling and simulation (M&S), and other analysis events sponsored by Federal agencies and other organizations in large-scale evaluation and analysis of radiation/nuclear (RN) detection instruments and procedures. The TEDAR will provide a repo ...

    SBIR Phase II 2014 Department of Homeland Security
  5. Search and Rescue Initial Response Tools

    SBC: DBS Productions, LLC            Topic: HSB0132003

    This proposal will result in innovative and life-saving software enabling first responders to easily see a heat map showing the probability of area for the missing person. Sending teams to the right area saves lives, resources, and time. New research into geographic models of subject behavior, detectability (effective sweep width), and search speed will for the first time provide planners with goo ...

    SBIR Phase II 2014 Department of Homeland Security
  6. Multi-layer Ever-changing Self-defense Service (MESS) CRPP

    SBC: Endeavor Systems            Topic: HSB0121002

    Today's static IT systems allow adversaries time to plan and launch attacks. Endeavor proposes a Multi-layer, Ever changing, Self-defense Service (MESS) that is resilient and manageable. MESS prevents attackers from exploiting a target system by removing the static network & system attributes that simplify reconnaissance. Continuously refreshing the target system to a new virtual instance with a k ...

    SBIR Phase II 2014 Department of Homeland Security
  7. Preventing Program Hijacking via Static and Dynamic Analyses

    SBC: ZEPHYR SOFTWARE LLC            Topic: OSD11IA5

    To hijack the execution of a program, an attacker must overwrite the value of a return address or a function pointer (broadly defined). To prevent program hijacking, our product will provide a layered defense of these two targets, including deterministic and randomization defenses, with the ability in many cases to continue execution after a hijacking attempt is prevented. Our product toolkit incl ...

    SBIR Phase II 2014 Department of DefenseOffice of the Secretary of Defense
  8. Active Software Defense to Reduce Threat Capability Effectiveness

    SBC: Power Fingerprinting, Inc            Topic: OSD11IA6

    In order to better protect critical infrastructure from cyber attacks, perimeter and passive defenses must be complemented with an active defense mechanism which elevates the risks, or costs, a potential attacker will face. The effectiveness of an active defense mechanism, however, is ultimately limited by its ability to detect threats fast, accurately, and reliably. For this Phase II project, we ...

    SBIR Phase II 2014 Department of DefenseOffice of the Secretary of Defense
  9. Event Attribute Recognition and Labeling (EARL)

    SBC: DECISIVE ANALYTICS CORPORATION            Topic: OSD12LD5

    Existing information extraction technology can only partially address the problem of exploiting unreadably-large amounts text. When discussion of events is limited to simple, past-tense, factual descriptions of events, current NLP-based systems can ident

    SBIR Phase II 2014 Department of DefenseOffice of the Secretary of Defense
  10. Decision Support for Anomaly Detection and Recovery for Unmanned System (ADRUS)

    SBC: KNEXUS RESEARCH LLC            Topic: OSD12AU1

    Deployment of unmanned systems continues to expand across a wide range of missions; for example, logistics and resupply missions, force application and protection, and improving battlespace awareness. Presently these unmanned systems run at the lowest of four possible levels of autonomy, that is, in a teleoperated mode, and each system typically requires multiple operators. To address this proble ...

    SBIR Phase II 2014 Department of DefenseOffice of the Secretary of Defense
US Flag An Official Website of the United States Government