Topic Information Award/Contract Number Proposal Information Company Performance

Development of commercial hand-held and backpack neutron detectors

HSHQDC-11-C-00108 SBIR11-1-SBIR11.1-001-FP-019
(HSHQDC-11-R-00087 Phase I)
Stilbene Production for Fast Neutron Detection

Photonic Products Group, Inc.
181 Legrand Ave
Northvale, NJ 07647-2404


The detection of neutrons is a critical capability for homeland security applications. Helium-3-based proportional counters are commonly employed; however, the supply of He-3 is insufficient to meet the demand. A replacement for He-3 detectors should efficiently detect neutrons in a gamma-ray background and be commercially available at prices equivalent to comparable detectors prior to the He-3 shortage. Organic scintillation crystals such as stilbene offer direct fast neutron detection with good neutron-gamma discrimination, yet availability has historically limited their use. Recently, solution crystal growth has been proposed as an alternate route towards the production of organic scintillators. In Phase I, Photonic Products Group, Inc. will develop a capability for production of stilbene crystals for efficient fast neutron detection.

Synthetic Biometrics

N10PC20210 1011145
(FY10.1 Phase I)
Synthetic Biometrics with Life-Like Appearance

Li Creative Technologies, Inc.
25 B Hanover Road, Suite 140
Florham Park, NJ 07932-1924


DHS has a unique requirement to evaluate the performance of biometrics in extremely large systems. To address the requirement, we propose a novel and promising approach including three subsystems to generate large-scale realistic synthetic iris, fingerprint and face images matching the statistical and performance attributes of real-world data. For iris synthesis, we propose a novel and efficient solution, which uses patch-based sampling techniques. For fingerprint synthesis, we use Gabor-like space-variant filters for iteratively expanding an initially empty image containing just one or a few seeds. For face synthesis, we propose to develop the software on top of the commercial face generation software to generate a large-scale facial image dataset. To generate synthetic biometrics with life-like appearance, we will utilize an extensive set of biometrics features to transform synthetic biometrics into biometrics images which exhibit life-like characteristics. After generating independent biometric dataset, analysis tools will be developed to ensure all synthetic images have similar visual appearance, and texture/quality distribution compared with the real instances. After texture/quality and performance analysis, the qualified biometric images will be combined to generate a large-scale multimodal biometric dataset.

Mitigation of Contact Lens, Eye Surgery, Pupil Dilation, and Other Challenges on Iris Recognition

D11PC20144 1111052
(FY11.1 Phase I)
Mitigation of Contact Lens, Eye Surgery, Pupil Dilation, and other Challenges on Iris Recognition

Li Creative Technologies, Inc.
25 B Hanover Road, Suite 140
Florham Park, NJ 07932-1924


Iris biometrics offers the potential for highly accurate identity verification. However, over 25 million people in the United States and over 125 million people worldwide wear contact lenses, and it would be impractical to require users to remove their contact lenses for recognition purposes. As a result, developing methods to measure and mitigate any degradation associated with contact lenses and other atypical eye conditions has become increasingly important to the future of iris recognition technology. In this DHS SBIR research project, we will study, analyze and mitigate the potential adverse effects of contact lenses, eye surgery, and varying pupil dilation, template aging, and sensor interoperability, on iris recognition. We will collaborate with Clarkson University to leverage their existing data collection efforts to examine potential performance variations of iris images with and without different types of contact lenses, before and after surgery, or at varying pupil dilation. After data collection, we will conduct a detailed analysis of the specific problems. If, as expected, significant performance differences are observed, image processing algorithms and machine learning approaches will be developed to detect and mitigate instances in which matching performance appears to have been degraded.

Enhanced Distributed Denial of Service Defense

HSHQDC-15-C-00019 HSHQDC-15-R-00017-H-SB015.1-003-0003-I
(HSHQDC-15-R-00017 Phase I)
Enhanced Distributed Denial of Service Defense through Single Packet Abuse Interdiction Network (SPAIN)

Vesaria LLC d/b/a Grier Forensics
708 Lakeview Drive
Lakewood, NJ 08701-3018


To meet the need for enhanced defense against distributed denial of service attacks (DDoS), Grier Forensics proposes developing SPAIN: Single Packet Abuse Interdiction Network. SPAIN amplifies the effectiveness and power of DDoS defenses, reversing the current asymmetry to instead favor the defender. Instead of the passive, isolated, single point defense in use today, SPAIN creates an active, distributed, network wide DDoS defense network. SPAIN is a simple, secure, resource minimal, autonomous and self-regulating system, built on top of existing Internet infrastructure, capable of being integrated into existing networks and devices.

A Wearable Communications Hub Designed to Streamline and Improve First Responder Communication Capabilities

HSHQDC-15-C-00025 HSHQDC-15-R-00017-H-SB015.1-005-0019-I
(HSHQDC-15-R-00017 Phase I)
(FiReBRIC) First Responder's Body-worn Robust Integrated Communications HUB

MaXentric Technologies LLC
2071 Lemoine Ave.
Suite 302
Fort Lee, NJ 07024-6007


Our objective is to develop an intelligent communications hub, or gateway device, capable of interconnecting wearable technologies with an array of wireless local and wide area communications systems like LMR, commercial & public safety 3G/LTE, WiFi, and mesh networking. To address this, MaXentric is proposing a solution capable of not only interconnecting devices to communications networks, but also to store significant amounts of data and serve as a node for distributed local cloud computing. MaXentric will be leveraging several internally developed technologies for this effort. The LMR service of the proposed solution will utilize a LMR (P25) SDR developed by MaXentric to form an integrated device, operating in both cellular broadband and LMR networks. This offers a proven and low-risk approach for the LMR network access. Moreover, the multi-network access and mesh networking capability is utilizing a network technology in a Command and Control (C2) network solution developed for the US Army. The latter is also extended to include solutions for distributed cloud computing in mesh networks. In addition, we will assess feasibility for first responders to operate the proposed solution while wearing Personal Protective Equipment (PPE) and evaluate system maintenance & training requirements. During the Phase I effort we will draw from MaXentric team members experience of previous work with public safety technologies and utilize our relationship with the public safety community in the San Diego region. Demonstration of key concept features of the proposed solution will be presented as part of the Phase I effort.

Remote Identity Proofing Alternatives to Knowledge Based Authentication/Verification

HSHQDC-16-C-00063 HSHQDC-16-R-00012-H-SB016.1-010-0006-I
(HSHQDC-16-R-00012 Phase I)
Composite Identity Model for Optimizing Next Generation Remote Identity Proofing Methods

CardSmart Technologies
17 Normandy
Basking Ridge, NJ 07920-1905


Losses due to identity misuse/fraud are staggering. The most commonly implemented identity proofing technique is Knowledge Based Verification (KBV), where applicants are challenged with questions for which only they know the answer. However KBV has a number of shortcomings, most notably that with widespread spillage of PII there isn't much that is "known only to the applicant". The proposed Phase I research will investigate the effectiveness of eight KBV-alternative approaches, ranging from online reputation to voice forensics. Some of these approaches have been previously attempted in a limited manner, others are more theoretical. Metrics will be developed around which these approaches can be categorized/evaluated including: complexity, implementation cost, ease of use, and other measures of effectiveness. The most promising of these methods will then populate a model for identity enrichment. This "Composite Identity" model will demonstrate how multiple identity proofing methods can be combined in order to exponentially strengthen the overall level of identity assurance. The composite identity model can even map-reduce all that is known about an identity to a single Composite Identity Score for each applicant, similar to the FICO number that credit agencies use as a measure of one's credit worthiness. Future commercial potential includes; the high-scoring identification verification methods or technologies could be further developed for widespread use; the composite identity model could be packaged as a plug-in for website builders requiring turn-key identity proofing; currency-style block chain technology could be the means by which Composite Identities are distributed and mutually trusted.

Automated & Scalable Analysis of Mobile & IoT Device Firmware

70RSAT18C00000022 FY18.1-H-SB018.1-008-0005-I
(FY18.1 Phase I)
Principled Security Analysis of the Firmware Binaries via Guaranteed Formal Verification and Scalable Dynamic Monitoring

Sekurity LLC
155 Washington St, Apt 1907
Jersey City, NJ 07302-4588


Consequently, to protect the mobile/IoT platforms against complex security attacks, there is a need for effective analysis of mobile/IoT firmware. Such a solution is currently missing in the market. In this DHS SBIR effort, we will develop BINSEC, a mobile/IoT firmware binary security analysis framework. To ensure acceptable scalability, usability, and universality across different firmware binary formats, BINSEC will use a combination of advanced binary reverse engineering, malware analysis, programming languages techniques, formal methods, and dynamic vulnerability assessment algorithms to generate accurate and human-perceivable reports in a timely manner. The anticipated ultimate outcome of our project will be an IoT firmware binary security analysis framework (BINSEC) that has the following features: i) universal: unlike the existing limited technologies, BINSEC will support a variety of common and widely-used IoT device ISAs, and binary formats through its code lifting procedures and use of common intermediate representation; ii) scalable: BINSEC will provide security analysis results in a timely manner for complex firmware binaries through its optimizations and use of parallel processing; iii) usable: BINSEC's human perceivable reports and interface will make it easy-to-use by security analysts without deep binary analysis knowledge requirements; iv) efficient: BINSEC will be leverage static and dynamic techniques to ensure the performance of its analysis across various firmware versions of the same device as well as the accuracy of its binary vulnerability assessment results; v) holistic: BINSEC will corroborate its firmware analysis results with network traces (e.g., invocation of the malicious code identified in the firmware).

Wide-Area TIC Neutralization

NBCHC050013 0421119
(FY04.2 Phase I)

Gumbs Associates, Inc.
11 Harts Lane
East Brunswick, NJ 08816-2040


This proposal addresses the need for thin, strippable and fast drying coatings for decontaminating surfaces exposed to wide-area toxic industrial chemicals. The goal is to encapsulate and neutralize the hazardous agents by using a low cost film, which is peeled from the surface after drying. The technical approach entails the formulation and evaluation of high molecular weight emulsion polymers with very low peel strength and high cohesive strength. Reactive materials will be added to the dispersion to neutralize the chemical agents by electron transfer reactions. The efficiency of decontamination will be evaluated to determine feasibility of the concept. Peelability of the activated coatings from various surfaces found in building interiors and exteriors will be determined in Phase I in efforts to demonstrate the broad spectrum utility and economic advantages of the proposed technology. Phase II will involve the application and evaluation of the coatings on large areas in the laboratory in efforts to demonstrate commercial viability. If the project is successful, it will provide the Nation with a low-cost method for decontaminating chemical, biological and radiological materials resulting from an attack by terrorists.


NBCHC060029 0521148
(FY05.2 Phase I)
Distributed Buoy Vessel Detection System

Ocean Power Technologies, Inc.
1590 Reed Road
Pennington, NJ 08534-5010


Ocean Power Technologies, Inc. (OPT) "Distributed Buoy Vessel Detection System" addresses the need for a forward-deployed buoy system to detect and track non-cooperative vessels. OPT proposes a network of proprietary passive acoustic sensors and COTS communication equipment, all powered by OPT's proprietary Autonomous PowerBuoyTM. The PowerBuoy can efficiently convert ocean wave energy to useable electricity to provide renewable energy power to the system for extended, unattended deployments. The acoustic sensor array will be developed by Lockheed Martin Undersea Systems and Sensors as a subcontractor to OPT. For the passive acoustic sensor array, two alternatives are presented, a bottom mounted array and a mid-water array. The radio communications link is comprised of COTS equipment, and four specific variations of the communication link are presented in this proposal. Because OPT and Lockheed both have extensive in-ocean experience in this area, the work to be carried out under a Phase I contract would focus on selecting, refining, optimizing and leveraging proven technologies for this application, rather than developing new sensor, power generation, and communication technologies. Phase II will involve an ocean demonstration of a complete prototype system leading subsequently to the full commercialization of the distributed buoy vessel detection system.

Subterranean Response and Evacuation

NBCHC080018 0711171
(FY07.1 Phase I)
Sensor Fusion Software to aid in response and evacuation of subterranean incidents

DAX Technologies International Corp.
100 Matawan Rd.
Suite 350
Matawan, NJ 07747-3911


The speed at which an attack is detected is a critical trigger for all responses to follow. The accurate determination of the type of attack will determine the type of emergency personnel and response needed. The location will determine by proximity which of the responders that are available can be first on the scene. Therefore, a system that can do that based on a multitude of input feeds such as sensors is of outmost importance. While sensor put out information - making sense in quick fashion of the data is paramount. A system such as Optima HLS that can fuse data from multiple sources, correlate it, find the root cause, and then automatically notify the required first responders will play a significant role in helping evacuate victims in a timely manner and therefore save lives. DAX intends to show a proof of concept prototype of its in house technology Optima HLS used in the identification and response to simulated incidents. To this effect inexpensive COTS sensors will be used to mock fire, collision, and explosion events in a subterranean tunnel and show how first responder response time can be improved when provided in real -time with accurate situational awareness.

Source Surveillance

HSHQDC-07-C-00102 0711290
(FY07.1 Phase I)
Radiation Source Monitor and Remote Surveillance

Structured Materials Industries, Inc.
201 Circle Drive North
Unit 102/103
Piscataway, NJ 08854-3723


SMI proposes developing a portable continuous monitoring system including a radiation sensor, positioning hardware, and wireless communication with a base station for reporting in order to strengthen the nation's ability to monitor and safely utilize radiation sources in legal manners. The local hardware, at the radiation source, will measure the radiation spectrum and intensity at its current location and as it is moved transported/relocated. This data will be reported, wirelessly, to a central command station. The command station will monitor the local hardware and produce an alarm (locally and to any designated entity) if the radiation or the positioning deviates from its boundary limits. In Phase I we will demonstrate proof of concept with low level laboratory sources and build relationships for Phase II field testing. In Phase II we will optimize the technology and field test units with local typical end users. This work will utilize our Frontliner (Trademark)/Site command hardware and software as a starting point for adaptation to the needs of this specific application. We will commercialize the technology throughout Phase II and beyond.

Noise Cancellation for Voice Operated Switch (VOX) Communications

N10PC20021 0921112
(FY09.2 Phase I)
Noise Cancellation for Voice Operated Switch (VOX) Communications

Li Creative Technologies, Inc.
25 B Hanover Road, Suite 140
Florham Park, NJ 07932-1924


The purpose of this proposal is to present a novel and promising noise attenuation solution for the first responders to effectively communicate in high-noise operation environment regardless of the communications mode (through radios in push-to-talk mode, VOX mode and without radios). For different application scenarios, we propose two possible solutions to handheld and hands-free applications, respectively. The proposed noise cancellation solution is based on our experiences in previous research and similar product design. Our research will be focused on improving signal-to-noisy ratio (SNR) for high-noise environments and extending the battery life. At the end of Phase I, all algorithms will be implemented and tested in an existing hardware platform. Also, preliminary hardware designs will be finished and all major chips for the device will be selected in Phase I.