You are here
The Award database is continually updated throughout the year. As a result, data for FY23 is not expected to be complete until September, 2024.
Download all SBIR.gov award data either with award abstracts (290MB)
or without award abstracts (65MB).
A data dictionary and additional information is located on the Data Resource Page. Files are refreshed monthly.
The SBIR.gov award data files now contain the required fields to calculate award timeliness for individual awards or for an agency or branch. Additional information on calculating award timeliness is available on the Data Resource Page.
SBC: Eikos, Inc. Topic: AF06T026
Eikos Inc. and the National Renewable Energy Laboratory propose to develop nanomaterial transparent electrodes to enhance the efficiency of three junction solar cells. Eikos leads the world in developing transparent conductive electodes based on carbon nanotubes (CNTs). Branded as Invisicon®, our patented technology has already been successfully employed to improve solar cell performance. Eikos c ...STTR Phase I 2006 Department of DefenseAir Force
Innovative Technologies Supporting Affordable Increases in Power, Efficiency, and Bandwidth for Ballistic Missile Defense System (BMDS) X-Band RadarsSBC: Group4 Labs, LLC Topic: MDA06T012
This Phase-I STTR MDA Proposal proposes the use of a new class of diamond-seeded solid-state material system for the manufacture of virtually all heat-generating solid-state electronics in X-band and Ballistic Missile Defense radar components and systems. In this proposal wherein much preliminary (DARPA- and MDA-funded) work has been demonstrated hitherto by the authors, all or most of the basic s ...STTR Phase I 2006 Department of DefenseMissile Defense Agency
SBC: HBGary, Inc. Topic: OSD06NC5
Tamper-proofed software and malicious binaries, commonly referred to as “malware”, often share similar technological features. Both good and bad guys wish to hinder static and dynamic reverse engineering of their software programs to thwart adversaries from gaining program understanding and to prevent the observation of code behavior. HBGary proposes the Virtual Machine for Analysis (VMA), a ...STTR Phase I 2006 Department of DefenseAir Force
Kernel-mode Software Protection Vulnerability Assessment and Rootkit Reverse Engineering Tool DevelopmentSBC: HBGary, Inc. Topic: OSD06NC4
Software protections mechanisms are a means for preventing piracy, alteration, and reverse engineering of critical national security software and data. Kernel-mode software protection techniques utilize, in-part, rootkit-like methods that provide anti-piracy and anti-reverse engineering protection to critical software applications. The fundamental difficulty associated with rootkits and software ...STTR Phase I 2006 Department of DefenseAir Force
Development of On-Demand Non-Polar and Semi-Polar Bulk Gallium Nitride Materials for Next Generation Electronic and Optoelectronic DevicesSBC: Inlustra Technologies LLC Topic: A06T019
Inlustra Technologies and the University of California, Santa Barbara propose to grow and characterize thick non-polar and semi-polar gallium nitride (GaN) wafers that will act as seeds for subsequent GaN boule growth. In this Phase I STTR effort, Inlustra will first develop non-polar and semi-polar GaN films with smooth surfaces and minimal wafer bowing and cracking. The growth conditions for e ...STTR Phase I 2006 Department of DefenseArmy
SBC: Intelligent Automation, Inc. Topic: AF06T024
Recent terrorist activities and law-enforcement situations involving hostage situations underscore the need for effective through-the-wall surveillance (TWS). Current building interior imaging systems are based on short-pulse waveforms, which are easily recognizable by the intelligent adversary who may employ countermeasures to confound detection. We propose a coherent continuous-wave ultrawideban ...STTR Phase I 2006 Department of DefenseAir Force
SBC: Intelligent Automation, Inc. Topic: A06T018
We propose a comprehensive and innovative approach for analysis and visualization of large, complex, multi-step cyber attack graphs. First, we select the radial space-filling hierarchy visualization module for large complex multi-step cyber attack graph due to its strengths in space efficiency and ease of interpretation. Once an attack is correlated, the attack notification service retrieves the ...STTR Phase I 2006 Department of DefenseArmy
Implicit Level Set Based Software for Generating Geometrically and Topologically Accurate Urban Terrain Models Using Implicit MethodsSBC: Level Set Systems Topic: A06T011
We propose a new method developed by our employees and collaborators for the digital representation of real world objects. This will result in an implicit surface urban terrain model that interpolates raw point cloud data. The method can handle complex topologies and geometries easily. Topology changes pose no difficulties. The key idea involves shrink wrapping an implicit surface around data poin ...STTR Phase I 2006 Department of DefenseArmy
SBC: MILCORD LLC Topic: N/A
As reported by Internet security threat reports, Bot networks are becoming the focal point for cybercriminals. Milcord and the University of Wisconsin, responds to this challenge with our proposal ¿ a ¿Bayesian Activity Monitor for Botnet Defense¿ (BAM-BD). In this proposal, we will research, design, and develop a botnet detection and mitigation tool that automatically classifies botnet behavio ...STTR Phase I 2006 Department of Homeland Security
SBC: MIRMAR SENSORS, LLC Topic: A06T016
Imaging with X-rays and gamma rays is a long established technique. It is possible with recent technological advances that standard transmission radiography may be extended to self-radiography, where the natural radioactivity of the object itself and the surrounding matrix is used as the source of X-rays. Self-radiography is much more complex than traditional radiography, chiefly because it depend ...STTR Phase I 2006 Department of DefenseArmy