You are here

Award Data

For best search results, use the search terms first and then apply the filters
Reset

The Award database is continually updated throughout the year. As a result, data for FY24 is not expected to be complete until March, 2025.

Download all SBIR.gov award data either with award abstracts (290MB) or without award abstracts (65MB). A data dictionary and additional information is located on the Data Resource Page. Files are refreshed monthly.

The SBIR.gov award data files now contain the required fields to calculate award timeliness for individual awards or for an agency or branch. Additional information on calculating award timeliness is available on the Data Resource Page.

  1. Solid state deep UV laser for Raman detection of CB agents

    SBC: Arete Associates            Topic: CBD11105

    Raman spectroscopy is well suited for detecting trace surface contaminants that may indicate the presence of explosives, harmful chemical or biological agents, illicit drugs, or specific combinations of indicator chemicals used in processing nuclear materials. An example mobile Raman spectroscopy system is the vehicle mounted Joint Contaminated Surface Detector (JCSD), which uses a gaseous KrF exc ...

    SBIR Phase II 2014 Department of DefenseOffice for Chemical and Biological Defense
  2. Sensitive and Selective Chemical Sensor Using Molecularly-Imprinted Single Layer Graphene

    SBC: Polestar Technologies, Inc.            Topic: CBD14102

    The overall goal of the SBIR Phase II program is development, fabrication, and demonstration of a fully integrated graphene-based sensor capable of detection of different types of chemical agents in the vapor phase with better than parts per billion (ppb) sensitivity and a high degree of specificity. It should also exhibit a reversible function of the sensing element. The program will synergistica ...

    SBIR Phase II 2014 Department of DefenseOffice for Chemical and Biological Defense
  3. Detection of active biological toxins by exploiting native binding specificities

    SBC: BINERGY SCIENTIFIC, INC.            Topic: CBD14101

    A chemical threat agent mode of action is often initiated through a selective interaction with a biological molecule or structure. The agent binding mimics normal cellular processes, but then overruns natural control mechanisms leading to toxic and lethal effects. The binding is used as a basis for sensing the agent. We are exploiting the native binding mechanism, designing and producing prototype ...

    SBIR Phase II 2014 Department of DefenseOffice for Chemical and Biological Defense
  4. Synergistic and Smart Micro-Controls for Enhanced SCBA Equipment

    SBC: MAINSTREAM ENGINEERING CORP            Topic: CBD14103

    This proposal outlines the successful demonstration of electrochemical CO2 removal that generates virtually no heat, from a humid breathing gas mixture. Mainstream evaluated micro-sensors for monitoring temperature, humidity, CO2, and O2 for breath monitoring for the self-contained breathing apparatus (SCBA). Advanced CO2 separating technology combined with micro-sensors and controls allows for op ...

    SBIR Phase II 2014 Department of DefenseOffice for Chemical and Biological Defense
  5. Rapid biodosimetry for accurate assessment of individual radiation exposure levels

    SBC: Active Spectrum, Inc.            Topic: CBD13108

    In the event of a catastrophic radiation disaster, first responders, both civilian and military, must be able to quickly and accurately measure the radiation dose received by victims in order to screen, perform triage and effectively assign available resources. First-responders must also be able to accurately evaluate their own exposure to radiation in order to make return-to-duty decisions in rea ...

    SBIR Phase II 2014 Department of DefenseOffice for Chemical and Biological Defense
  6. Preventing Program Hijacking via Static and Dynamic Analyses

    SBC: ZEPHYR SOFTWARE LLC            Topic: OSD11IA5

    To hijack the execution of a program, an attacker must overwrite the value of a return address or a function pointer (broadly defined). To prevent program hijacking, our product will provide a layered defense of these two targets, including deterministic and randomization defenses, with the ability in many cases to continue execution after a hijacking attempt is prevented. Our product toolkit incl ...

    SBIR Phase II 2014 Department of DefenseOffice of the Secretary of Defense
  7. Active Software Defense to Reduce Threat Capability Effectiveness

    SBC: Power Fingerprinting, Inc            Topic: OSD11IA6

    In order to better protect critical infrastructure from cyber attacks, perimeter and passive defenses must be complemented with an active defense mechanism which elevates the risks, or costs, a potential attacker will face. The effectiveness of an active defense mechanism, however, is ultimately limited by its ability to detect threats fast, accurately, and reliably. For this Phase II project, we ...

    SBIR Phase II 2014 Department of DefenseOffice of the Secretary of Defense
  8. Toolkit for Managing Evaluation and Testing for Red Team Investigations of Cyber Security (METRICS)

    SBC: CHARLES RIVER ANALYTICS, INC.            Topic: OSD12IA1

    Adversaries are becoming increasingly proficient at cyber attacks against command and control infrastructure. Maintaining security requires high-fidelity assessments of software services, e.g., through exercises in which Systems Under Test are subjected t

    SBIR Phase II 2014 Department of DefenseOffice of the Secretary of Defense
  9. Fashioning of an Adaptive Workspace through Autonomous Services

    SBC: SECURBORATION, INC.            Topic: OSD12AU5

    During Phase I of this research, the Securboration Team prototyped the Adaptive Data Immersion ENvironment (ADIEN) and demonstrated groundbreaking capability in adaptive human machine collaboration one in which the computer learns, adapts, and informs analysts based on their practices, situational context, and data content. ADIEN provides a unique and innovative system that is data centric in ter ...

    SBIR Phase II 2014 Department of DefenseOffice of the Secretary of Defense
  10. AWAKE: Adaptive Workspace for Analyst Knowledge & Engagement

    SBC: APTIMA INC            Topic: OSD12AU5

    There is an increasing need for fast and accurate analysis of large volumes of disparate data containing critical information. Existing tools for information search, retrieval, and exploitation are inadequate because the tools have limited ability to (1) help the analyst understand the semantics within the information, (2) reveal the relationships between the information and the analytic task, or ...

    SBIR Phase II 2014 Department of DefenseOffice of the Secretary of Defense
US Flag An Official Website of the United States Government