Filter Search for grants
Call Navigation
Deadline expired
The deadline for this call has expired.
Call key data
Trustworthy methodologies, tools and data security “by design” for dynamic testing of potentially vulnerable, insecure hardware and software components
Call number
HORIZON-CL3-2022-CS-01-02
deadlines
Opening
01.07.2022
Deadline
16.11.2022 17:00
Funding rate
100 %
Call budget
€ 17,300,000.00
Estimated EU contribution per project
€ 3,000,000.00 - 5,000,000.00
Link to the call
Link to the submission
Call content
Call objectives
Trustworthy methodologies and tools for advanced analysis and verification, and dynamic testing of potentially vulnerable, insecure hardware and software components calls for good practices for system security, with a particular focus on software development tools, IT security metric and guidelines for secure products and services throughout their lifetime. A holistic methodology is needed, integrating runtime methods for monitoring and enforcement as well as design-time methods for static analysis and programme synthesis, which allows for the construction of secure systems with the strongest possible formal guarantees. The firmware of devices, implementations of communication protocols and stacks, Operating Systems (OSs), Application Programming Interfaces (APIs) supporting interoperability and connectivity of different services, device drivers, backend cloud and virtualisation software, as well as software implementing different service functionalities, are some examples of how software provides the essence of systems and smart (networked) objects. Supply chain issues, including integration of software and hardware, should be considered appropriately.
R&I will be funded to develop hybrid, agile and high-assurance tools capable of automating evaluation processes, accountability tools for audit results and updates and lightweight, isolated virtualisation environments capable of securely inspecting and orchestrating appliances in heterogeneous hardware and software architectures. Moreover, KPIs, metrics, procedures and tools for dynamic certification of implementation security and scalable security, from chip-level to software-level and service-level, should be developed. It may also include testing methods like coverage guided fuzzing as well as symbolic execution.
The participation of SMEs is strongly encouraged. In this topic the integration of the gender dimension (sex and gender analysis) in research and innovation content is not a mandatory requirement.
read more
Expected results
- Effective access control to system components and management of trustworthy updates
- Modelling of security and privacy properties and frameworks for validating and integration on the testing process
- Integrated process for testing, formal verification, validation and consideration of certification aspects (including potential synergies with the EU cybersecurity certification framework, as established by the EU Cybersecurity Act)
- Tools providing assurance that third-party and open source components are free from vulnerabilities, weaknesses and/or malware
- Data security “by design” e.g. via secure crypto building blocks
- Instrumentation and secured communication with system components for dynamic testing
- Methods and environments for secured coding by-design and by-default and secure hardware and software construction
- Effective audit procedures for cybersecurity testing
- Methods or procedures to make supply chains secure
read more
Eligibility Criteria
Regions / countries for funding
Moldova (Moldova), Albania (Shqipëria), Armenia (Հայաստան), Bosnia and Herzegovina (Bosna i Hercegovina / Босна и Херцеговина), Faeroes (Føroyar / Færøerne), Georgia (საქართველო), Iceland (Ísland), Kosovo (Kosova/Kosovë / Косово), Montenegro (Црна Гора), Morocco (المغرب), North Macedonia (Северна Македонија), Norway (Norge), Serbia (Srbija/Сpбија), Tunisia (تونس /Tūnis), Türkiye, Ukraine (Україна), United Kingdom
eligible entities
EU Body, Education and training institution, International organization, Non-Profit Organisation (NPO) / Non-Governmental Organisation (NGO), Other, Private institution, incl. private company (private for profit), Public Body (national, regional and local; incl. EGTCs), Research Institution incl. University, Small and medium-sized enterprise (SME)
Mandatory partnership
Yes
Project Partnership
Unless otherwise provided for in the specific call conditions , legal entities forming a consortium are eligible to participate in actions provided that the consortium includes:
- at least one independent legal entity established in a Member State;and
- at least two other independent legal entities, each established in different Member States or Associated Countries.
eligible non-EU countries:
- countries associated to Horizon Europe
- low-and middle-income countries
Legal entities which are established in countries not listed above will be eligible for funding if provided for in the specific call conditions, or if their participation is considered essential for implementing the action by the granting authority.
other eligibility criteria
Activities are expected to achieve TRL 4 by the end of the project.
Additional information
Topics
UN Sustainable Development Goals (UN-SDGs)
Additional Information
Proposal page limits and layout:
The application form will have two parts:
-
Part A to be filled in directly online (administrative information, summarised budget, call-specific questions, etc.)
-
Part B to be downloaded from the Portal submission system, completed and re-uploaded as a PDF in the system; page limit: 45 pages
To see more information about this call, you can register for free here
or log in with an existing account.
Log in
Register now