HORIZON-CL3-2024-CS-01-01: Approaches and tools for security in software and hardware development and assessment
ExpectedOutcome:Projects’ results are expected to contribute to some or all of the following outcomes:
Áreas
Próximamente
Presentación
Minimum 3 independent legal entities based in 3 different Member States or Associated States, of which at least 1 is from a Member State. EU member states (Austria, Belgium, Bulgaria, Croatia, Cyprus, Czechia, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden), Associated third countries (Albania, Armenia, Bosnia and Herzegovina, Faroe Islands, Georgia, Iceland, Israel, Kosovo, Moldova, Montenegro, New Zealand, North Macedonia, Norway, Serbia, Tunisia, Türkiye, Ukraine, United Kingdom), Other third countries. A partner from an EU or associated country must coordinate the project. Partners from other third countries cannot act as coordinators.
Puedes aplicar a ella en el siguiente link.
Objetivo
ExpectedOutcome:Projects’ results are expected to contribute to some or all of the following outcomes:
Improved hardware and software security engineering; resilient systems design;Improved access to testing of hardware and software in virtual, closed and secure environments;Systematic and, where possible, automated study of vulnerabilities, software analysis, vulnerability discovery, and dynamic security assessment;Trustworthy certifiable hardware and software;AI-based security services e.g. predictive security, advanced anomaly and intrusion detection, system health checks.
Scope:Software is at the foundation of all digital technologies and, as such, at the core of IT infrastructures, services, and products. Current software development prioritises fast deployment over security, which results in vulnerabilities and unsecure applications. Security engineering, both at the software and hardware levels, must be integrated in their development. Whilst a great portion...
ver más
ExpectedOutcome:Projects’ results are expected to contribute to some or all of the following outcomes:
Improved hardware and software security engineering; resilient systems design;Improved access to testing of hardware and software in virtual, closed and secure environments;Systematic and, where possible, automated study of vulnerabilities, software analysis, vulnerability discovery, and dynamic security assessment;Trustworthy certifiable hardware and software;AI-based security services e.g. predictive security, advanced anomaly and intrusion detection, system health checks.
Scope:Software is at the foundation of all digital technologies and, as such, at the core of IT infrastructures, services, and products. Current software development prioritises fast deployment over security, which results in vulnerabilities and unsecure applications. Security engineering, both at the software and hardware levels, must be integrated in their development. Whilst a great portion of the software and hardware used in the EU is developed outside the European Union, it should comply with the security requirements within the EU. The EU should be able to rely on software and hardware that can be verified and audited as to their security. In particular, the potential security implications of using open-source software and hardware, and security auditability in that context, should be further explored. Software is subject to continuous update, so the security posture cannot be assessed once and for all, hence methods and tooling to perform continuous assessments of security are needed. In addition, security and privacy regulations also evolve, having to be factored in compliance approaches.
The identification and analysis of potential regulatory aspects and barriers for the developed technologies/solutions is encouraged, where relevant.
ver menos
Temáticas
- Temática principal: Authentication protocols/frameworks, authorization, Internet of Things, embedded/pervasive systems, Vulnerability discovery and penetration testing... ver más.
Características del líder del consorcio
Ambito
Categorias
Características del Proyecto
Requisitos
Requisitos
Capítulos
Tecnología
Características de la financiación
%
Intensidad de la ayuda: Sólo fondo perdido + info
2.8M - 6.0M €
Min - Max. Fondo perdido
The funding rate for IA projects is 70 % for profit-making legal entities and 100 % for non-profit legal entities.
Condiciones
Información adicional de la convocatoria
E. Incentiv.
Respuesta
Competitiva
Minimis
Otras ventajas
Sello