Innovating Works

H2020

Cerrada
HORIZON-CL3-2022-CS-01-02
HORIZON-CL3-2022-CS-01-02: Trustworthy methodologies, tools and data security “by design” for dynamic testing of potentially vulnerable, insecure hardware and software components
ExpectedOutcome:Projects are expected to contribute to some of the following expected outcomes:
Sólo fondo perdido 0 €
Europeo
Esta convocatoria está cerrada Esta línea ya está cerrada por lo que no puedes aplicar. Cerró el pasado día 16-11-2022.
Se espera una próxima convocatoria para esta ayuda, aún no está clara la fecha exacta de inicio de convocatoria.
Por suerte, hemos conseguido la lista de proyectos financiados!
Presentación: Consorcio Consorcio: Esta ayuda está diseñada para aplicar a ella en formato consorcio..
Esta ayuda financia Proyectos:

ExpectedOutcome:Projects are expected to contribute to some of the following expected outcomes:

Effective access control to system components and management of trustworthy updatesModelling of security and privacy properties and frameworks for validating and integration on the testing processIntegrated process for testing, formal verification, validation and consideration of certification aspects (including potential synergies with the EU cybersecurity certification framework, as established by the EU Cybersecurity Act)Tools providing assurance that third-party and open source components are free from vulnerabilities, weaknesses and/or malwareData security “by design” e.g. via secure crypto building blocksInstrumentation and secured communication with system components for dynamic testingMethods and environments for secured coding by-design and by-default and secure hardware and software constructionEffective audit procedures for cybersecurity testingMethods or procedures to make supply chains secure The proposal should provide appropriate indicators to measure its progress and specific impact.


Scope:Trustworthy methodologies and tools for advanced... ver más

ExpectedOutcome:Projects are expected to contribute to some of the following expected outcomes:

Effective access control to system components and management of trustworthy updatesModelling of security and privacy properties and frameworks for validating and integration on the testing processIntegrated process for testing, formal verification, validation and consideration of certification aspects (including potential synergies with the EU cybersecurity certification framework, as established by the EU Cybersecurity Act)Tools providing assurance that third-party and open source components are free from vulnerabilities, weaknesses and/or malwareData security “by design” e.g. via secure crypto building blocksInstrumentation and secured communication with system components for dynamic testingMethods and environments for secured coding by-design and by-default and secure hardware and software constructionEffective audit procedures for cybersecurity testingMethods or procedures to make supply chains secure The proposal should provide appropriate indicators to measure its progress and specific impact.


Scope:Trustworthy methodologies and tools for advanced analysis and verification, and dynamic testing of potentially vulnerable, insecure hardware and software components calls for good practices for system security, with a particular focus on software development tools, IT security metric and guidelines for secure products and services throughout their lifetime. A holistic methodology is needed, integrating runtime methods for monitoring and enforcement as well as design-time methods for static analysis and programme synthesis, which allows for the construction of secure systems with the strongest possible formal guarantees. The firmware of devices, implementations of communication protocols and stacks, Operating Systems (OSs), Application Programming Interfaces (APIs) supporting interoperability and connectivity of different services, device drivers, backend cloud and virtualisation software, as well as software implementing different service functionalities, are some examples of how software provides the essence of systems and smart (networked) objects. Supply chain issues, including integration of software and hardware, should be considered appropriately.

R&I will be funded to develop hybrid, agile and high-assurance tools capable of automating evaluation processes, accountability tools for audit results and updates and lightweight, isolated virtualisation environments capable of securely inspecting and orchestrating appliances in heterogeneous hardware and software architectures. Moreover, KPIs, metrics, procedures and tools for dynamic certification of implementation security and scalable security, from chip-level to software-level and service-level, should be developed. It may also include testing methods like coverage guided fuzzing as well as symbolic execution.

The participation of SMEs is strongly encouraged. In this topic the integration of the gender dimension (sex and gender analysis) in research and innovation content is not a mandatory requirement.


Specific Topic Conditions:Activities are expected to achieve TRL 4 by the end of the project – see General Annex B.




Cross-cutting Priorities:Artificial IntelligenceDigital Agenda


ver menos

Temáticas Obligatorias del proyecto: Temática principal:

Características del consorcio

Ámbito Europeo : La ayuda es de ámbito europeo, puede aplicar a esta linea cualquier empresa que forme parte de la Comunidad Europea.
Tipo y tamaño de organizaciones: El diseño de consorcio necesario para la tramitación de esta ayuda necesita de:

Características del Proyecto

Requisitos de diseño: Duración:
Requisitos técnicos: ExpectedOutcome:Projects are expected to contribute to some of the following expected outcomes: ExpectedOutcome:Projects are expected to contribute to some of the following expected outcomes:
¿Quieres ejemplos? Puedes consultar aquí los últimos proyectos conocidos financiados por esta línea, sus tecnologías, sus presupuestos y sus compañías.
Capítulos financiables: Los capítulos de gastos financiables para esta línea son:
Personnel costs.
Subcontracting costs.
Purchase costs.
Other cost categories.
Indirect costs.
Madurez tecnológica: La tramitación de esta ayuda requiere de un nivel tecnológico mínimo en el proyecto de TRL 4:. Es el primer paso para determinar si los componentes individuales funcionarán juntos como un sistema en un entorno de laboratorio. Es un sistema de baja fidelidad para demostrar la funcionalidad básica y se definen las predicciones de rendimiento asociadas en relación con el entorno operativo final. + info.
TRL esperado:

Características de la financiación

Intensidad de la ayuda: Sólo fondo perdido + info
Fondo perdido:
0% 25% 50% 75% 100%
Para el presupuesto subvencionable la intensidad de la ayuda en formato fondo perdido podrá alcanzar como minimo un 100%.
The funding rate for RIA projects is 100 % of the eligible costs for all types of organizations. The funding rate for RIA projects is 100 % of the eligible costs for all types of organizations.
Garantías:
No exige Garantías
No existen condiciones financieras para el beneficiario.

Información adicional de la convocatoria

Efecto incentivador: Esta ayuda no tiene efecto incentivador. + info.
Respuesta Organismo: Se calcula que aproximadamente, la respuesta del organismo una vez tramitada la ayuda es de:
Meses de respuesta:
Muy Competitiva:
No Competitiva Competitiva Muy Competitiva
No conocemos el presupuesto total de la línea pero en los últimos 6 meses la línea ha concecido
Total concedido en los últimos 6 meses.
Minimis: Esta línea de financiación NO considera una “ayuda de minimis”. Puedes consultar la normativa aquí.

Otras ventajas

Sello PYME: Tramitar esta ayuda con éxito permite conseguir el sello de calidad de “sello pyme innovadora”. Que permite ciertas ventajas fiscales.
HORIZON-CL3-2022-CS-01 Trustworthy methodologies, tools and data security “by design” for dynamic testing of potentially vulnerable, insecure hardware and software components ExpectedOutcome:Projects are expected to contribute to some of the following expected outcomes: Effective access control to system componen...
Sin info.
HORIZON-CL3-2022-CS-01-03 Transition towards Quantum-Resistant Cryptography
en consorcio: ExpectedOutcome:Projects are expected to contribute to at least three of the following expected outcomes: Measuring, assessing and standard...
Cerrada hace 2 años | Próxima convocatoria prevista para el mes de
HORIZON-CL3-2022-CS-01-01 Improved monitoring of threats, intrusion detection and response in complex and heterogeneous digital systems and infrastructures
en consorcio: ExpectedOutcome:Projects are expected to contribute to at least three of the following expected outcomes: Improved disruption preparedness...
Cerrada hace 2 años | Próxima convocatoria prevista para el mes de
HORIZON-CL3-2022-CS-01-04 Development and validation of processes and tools used for agile certification of ICT products, ICT services and ICT processes
en consorcio: ExpectedOutcome:Projects are expected to contribute to at least three of the following outcomes: Availability of applicable tools and proce...
Cerrada hace 2 años | Próxima convocatoria prevista para el mes de
HORIZON-CL3-2022-CS-01-02 Trustworthy methodologies, tools and data security “by design” for dynamic testing of potentially vulnerable, insecure hardware and software components
en consorcio: ExpectedOutcome:Projects are expected to contribute to some of the following expected outcomes: Effective access control to system componen...
Cerrada hace 2 años | Próxima convocatoria prevista para el mes de
HORIZON-CL3-2022-CS-01-04 Improved monitoring of threats, intrusion detection and response in complex and heterogeneous digital systems and infrastructures
Cerrada hace 54 años | Próxima convocatoria prevista para el mes de
HORIZON-CL3-2022-CS-01-04 Transition towards Quantum-Resistant Cryptography
en consorcio: ExpectedOutcome:Projects are expected to contribute to at least three of the following expected outcomes: Measuring, assessing and standard...
Cerrada hace 54 años | Próxima convocatoria prevista para el mes de