Innovating Works

H2020

Cerrada
HORIZON-CL3-2021-CS-01-02
Improved security in open-source and open-specification hardware for connected devices
ExpectedOutcome:Projects are expected to contribute to some of the following expected outcomes:
Sólo fondo perdido 0 €
Europeo
Esta convocatoria está cerrada Esta línea ya está cerrada por lo que no puedes aplicar. Cerró el pasado día 21-10-2021.
Se espera una próxima convocatoria para esta ayuda, aún no está clara la fecha exacta de inicio de convocatoria.
Por suerte, hemos conseguido la lista de proyectos financiados!
Presentación: Consorcio Consorcio: Esta ayuda está diseñada para aplicar a ella en formato consorcio..
Esta ayuda financia Proyectos:

ExpectedOutcome:Projects are expected to contribute to some of the following expected outcomes:

Reduced security threats of open source hardware for connected devices.Formal verification of open hardware.Effective management of cybersecurity patches for connected devices in restricted environments such as IoT devices.Effective security audits of open source hardware, embedded software and other security-relevant aspects of connected devices.Effective mechanisms for inventory management, detection of insecure components and decommissioning.Methods for secure authentication and secure communication for connected devices in restricted environments such as IoT devices The proposal should provide appropriate indicators to measure its progress and specific impact.


Scope:The quality of hardware and software, notably open source, for IoT and connected devices is improving. However, the restricted environment of many IoT devices does not allow the deployment of more complex protection schemes (e.g. Trusted Platform Modules, Sandboxing applications in managed memory partitions) and similar approaches that often rely on operating system (OS) support to ensure... ver más

ExpectedOutcome:Projects are expected to contribute to some of the following expected outcomes:

Reduced security threats of open source hardware for connected devices.Formal verification of open hardware.Effective management of cybersecurity patches for connected devices in restricted environments such as IoT devices.Effective security audits of open source hardware, embedded software and other security-relevant aspects of connected devices.Effective mechanisms for inventory management, detection of insecure components and decommissioning.Methods for secure authentication and secure communication for connected devices in restricted environments such as IoT devices The proposal should provide appropriate indicators to measure its progress and specific impact.


Scope:The quality of hardware and software, notably open source, for IoT and connected devices is improving. However, the restricted environment of many IoT devices does not allow the deployment of more complex protection schemes (e.g. Trusted Platform Modules, Sandboxing applications in managed memory partitions) and similar approaches that often rely on operating system (OS) support to ensure cybersecurity. Open Source designs are frequently used in IoT technology and become more reliable and efficient with the number of developers that deploy them. The management of this large collaborative development environment that Open Source represents is a real cybersecurity challenge.

The aim is to support European trustworthy platforms by methods, tools and technologies that foster a stronger Cybersecurity, which can serve in a variety of connected devices. The proposed action should integrate formal security models and verified and scalable cryptography that can be used in future key system components (operating systems,…).

Proposals should cover one or more of these research activities:

development of verifiable implementations of cryptographic solutions, authentication schemes, and, as relevant, software libraries that implement them securely in operating systems;develop mechanisms to mitigate hardware-related security vulnerabilitiesdevelopment of security auditing for connected devices;development and advancing of security testing in restricted environments;development and advancing of verification methods for secure firmware updates and secure software patching in connected devices;development of multi-factor authentication hardware and software solutions.development of the security upgrading of the connected devices within the life cycle (bootstrapping, commissioning, operational, upgrade etc.) The participation of SMEs is strongly encouraged. In this topic the integration of the gender dimension (sex and gender analysis) in research and innovation content is not a mandatory requirement.


ver menos

Temáticas Obligatorias del proyecto: Temática principal:

Características del consorcio

Ámbito Europeo : La ayuda es de ámbito europeo, puede aplicar a esta linea cualquier empresa que forme parte de la Comunidad Europea.
Tipo y tamaño de organizaciones: El diseño de consorcio necesario para la tramitación de esta ayuda necesita de:
Empresas Micro, Pequeña, Mediana, Grande
Centros Tecnológicos
Universidades
Organismos públicos

Características del Proyecto

Requisitos de diseño: Duración:
Requisitos técnicos: ExpectedOutcome:Projects are expected to contribute to some of the following expected outcomes: ExpectedOutcome:Projects are expected to contribute to some of the following expected outcomes:
¿Quieres ejemplos? Puedes consultar aquí los últimos proyectos conocidos financiados por esta línea, sus tecnologías, sus presupuestos y sus compañías.
Capítulos financiables: Los capítulos de gastos financiables para esta línea son:
Madurez tecnológica: La tramitación de esta ayuda requiere de un nivel tecnológico mínimo en el proyecto de TRL 4:. Es el primer paso para determinar si los componentes individuales funcionarán juntos como un sistema en un entorno de laboratorio. Es un sistema de baja fidelidad para demostrar la funcionalidad básica y se definen las predicciones de rendimiento asociadas en relación con el entorno operativo final. + info.
TRL esperado:
Estadísticas proyectos financiados: Te facilitamos algunas estadísticas de los últimos 3 proyectos tramitados conocidos por categoría de empresa, porcentaje y presupuesto medio.

Categoria

%

Presupuesto medio

Micro

25%

0€

Pequeña

25%

0€

Grande

50%

0€

Características de la financiación

Intensidad de la ayuda: Sólo fondo perdido + info
Fondo perdido:
0% 25% 50% 75% 100%
The funding rate for RIA projects is 100 % of the eligible costs for all types of organizations. The funding rate for RIA projects is 100 % of the eligible costs for all types of organizations.
Garantías: No existe condiciones financieras para el beneficiario.

Información adicional de la convocatoria

Efecto incentivador: Esta ayuda no tiene efecto incentivador. + info.
Respuesta Organismo: Se calcula que aproximadamente, la respuesta del organismo una vez tramitada la ayuda es de:
Meses de respuesta:
Muy Competitiva:
No Competitiva Competitiva Muy Competitiva
No conocemos el presupuesto total de la línea pero en los últimos 6 meses la línea ha concecido
Total concedido en los últimos 6 meses.
Minimis: Esta línea de financiación NO considera una “ayuda de minimis”. Puedes consultar la normativa aquí.

Otras ventajas

Sello PYME: Tramitar esta ayuda con éxito permite conseguir el sello de calidad de “sello pyme innovadora”. Que permite ciertas ventajas fiscales.