Innovating Works
HORIZON-CL3-2022-CS-01-02
Trustworthy methodologies, tools and data security “by design” fo...
ExpectedOutcome:Projects are expected to contribute to some of the following expected outcomes:
Sólo fondo perdido 0 €
Europeo
Esta convocatoria está cerrada Esta línea ya está cerrada por lo que no puedes aplicar.
Se espera una próxima convocatoria para esta ayuda, aún no está clara la fecha exacta de inicio de convocatoria.
Presentación: Consorcio Consorcio: Esta ayuda está diseñada para aplicar a ella en formato consorcio.
Número mínimo de participantes.
Esta ayuda financia Proyectos:

ExpectedOutcome:Projects are expected to contribute to some of the following expected outcomes:

Effective access control to system components and management of trustworthy updatesModelling of security and privacy properties and frameworks for validating and integration on the testing processIntegrated process for testing, formal verification, validation and consideration of certification aspects (including potential synergies with the EU cybersecurity certification framework, as established by the EU Cybersecurity Act)Tools providing assurance that third-party and open source components are free from vulnerabilities, weaknesses and/or malwareData security “by design” e.g. via secure crypto building blocksInstrumentation and secured communication with system components for dynamic testingMethods and environments for secured coding by-design and by-default and secure hardware and software constructionEffective audit procedures for cybersecurity testingMethods or procedures to make supply chains secure The proposal should provide appropriate indicators to measure its progress and specific impact.


Scope:Trustworthy methodologies and tools for advanced... ver más

ExpectedOutcome:Projects are expected to contribute to some of the following expected outcomes:

Effective access control to system components and management of trustworthy updatesModelling of security and privacy properties and frameworks for validating and integration on the testing processIntegrated process for testing, formal verification, validation and consideration of certification aspects (including potential synergies with the EU cybersecurity certification framework, as established by the EU Cybersecurity Act)Tools providing assurance that third-party and open source components are free from vulnerabilities, weaknesses and/or malwareData security “by design” e.g. via secure crypto building blocksInstrumentation and secured communication with system components for dynamic testingMethods and environments for secured coding by-design and by-default and secure hardware and software constructionEffective audit procedures for cybersecurity testingMethods or procedures to make supply chains secure The proposal should provide appropriate indicators to measure its progress and specific impact.


Scope:Trustworthy methodologies and tools for advanced analysis and verification, and dynamic testing of potentially vulnerable, insecure hardware and software components calls for good practices for system security, with a particular focus on software development tools, IT security metric and guidelines for secure products and services throughout their lifetime. A holistic methodology is needed, integrating runtime methods for monitoring and enforcement as well as design-time methods for static analysis and programme synthesis, which allows for the construction of secure systems with the strongest possible formal guarantees. The firmware of devices, implementations of communication protocols and stacks, Operating Systems (OSs), Application Programming Interfaces (APIs) supporting interoperability and connectivity of different services, device drivers, backend cloud and virtualisation software, as well as software implementing different service functionalities, are some examples of how software provides the essence of systems and smart (networked) objects. Supply chain issues, including integration of software and hardware, should be considered appropriately.

R&I will be funded to develop hybrid, agile and high-assurance tools capable of automating evaluation processes, accountability tools for audit results and updates and lightweight, isolated virtualisation environments capable of securely inspecting and orchestrating appliances in heterogeneous hardware and software architectures. Moreover, KPIs, metrics, procedures and tools for dynamic certification of implementation security and scalable security, from chip-level to software-level and service-level, should be developed. It may also include testing methods like coverage guided fuzzing as well as symbolic execution.

The participation of SMEs is strongly encouraged. In this topic the integration of the gender dimension (sex and gender analysis) in research and innovation content is not a mandatory requirement.


Specific Topic Conditions:Activities are expected to achieve TRL 4 by the end of the project – see General Annex B.




Cross-cutting Priorities:Artificial IntelligenceDigital Agenda


ver menos

Temáticas Obligatorias del proyecto: Temática principal: Digital Agenda Secure software architectures by design Systems Certification and Failure Investigation Assurance Audit and Certification Software and Hardware Security Engineering Trusted computing Security testing and validation Domain-specific modelling security Integrated systems testing & evaluation Artificial Intelligence Formal verification of security assurance Identity management quality assurance Software testing processes and tools Hardware-in-the-loop-testing

Características del consorcio

Ámbito Europeo : La ayuda es de ámbito europeo, puede aplicar a esta linea cualquier empresa que forme parte de la Comunidad Europea.
Tipo y tamaño de organizaciones: El diseño de consorcio necesario para la tramitación de esta ayuda necesita de:

Características del Proyecto

Requisitos de diseño por participante: Duración:
Requisitos técnicos: ExpectedOutcome:Projects are expected to contribute to some of the following expected outcomes: ExpectedOutcome:Projects are expected to contribute to some of the following expected outcomes:
¿Quieres ejemplos? Puedes consultar aquí los últimos proyectos conocidos financiados por esta línea, sus tecnologías, sus presupuestos y sus compañías.
Capítulos financiables: Los capítulos de gastos financiables para esta línea son:
Personnel costs.
Gastos relacionados con el personal que trabaja directamente en el proyecto basado en las horas efectivas dedicadas, basado en el coste empresa y ratios fijos para determinados empleados como los dueños de la compañía.
Subcontracting costs.
Pagos a terceros externos para realizar tareas específicas que no pueden ser realizadas por los beneficiarios del proyecto.
Purchase costs.
Incluyen la adquisición de equipos, amortizaciones, material, licencias u otros bienes y servicios necesarios para la ejecución del proyecto
Other cost categories.
Gastos diversos como costes financieros, certificados de auditoría o participación en eventos no cubiertos por otras categorías
Indirect costs.
Gastos generales no asignables directamente al proyecto (como electricidad, alquiler u oficina), calculados como un 25% fijo sobre los costes directos elegibles (excepto subcontratación).
Madurez tecnológica: La tramitación de esta ayuda requiere de un nivel tecnológico mínimo en el proyecto de TRL 4:. Los componentes que integran determinado proyecto de innovación han sido identificados y se busca establecer si dichos componentes individuales cuentan con las capacidades para actuar de manera integrada, funcionando conjuntamente en un sistema. + info.
TRL esperado:

Características de la financiación

Intensidad de la ayuda: Sólo fondo perdido + info
Fondo perdido:
Para el presupuesto subvencionable la intensidad de la ayuda en formato fondo perdido podrá alcanzar como minimo un 100%.
The funding rate for RIA projects is 100 % of the eligible costs for all types of organizations. The funding rate for RIA projects is 100 % of the eligible costs for all types of organizations.
Garantías:
No exige Garantías
No existen condiciones financieras para el beneficiario.

Información adicional de la convocatoria

Efecto incentivador: Esta ayuda no tiene efecto incentivador. + info.
Respuesta Organismo: Se calcula que aproximadamente, la respuesta del organismo una vez tramitada la ayuda es de:
Meses de respuesta:
Muy Competitiva:
No Competitiva Competitiva Muy Competitiva
No conocemos el presupuesto total de la línea
Minimis: Esta línea de financiación NO considera una “ayuda de minimis”. Puedes consultar la normativa aquí.

Otras ventajas

Sello PYME: Tramitar esta ayuda con éxito permite conseguir el sello de calidad de “sello pyme innovadora”. Que permite ciertas ventajas fiscales.
HORIZON-CL3-2022-CS-01 Trustworthy methodologies, tools and data security “by design” for dynamic testing of potentially vulnerable, insecure hardware and software components ExpectedOutcome:Projects are expected to contribute to some of the following expected outcomes: Effective access control to system componen...
Sin info.
HORIZON-CL3-2022-CS-01-03 Improved monitoring of threats, intrusion detection and response in complex and heterogeneous digital systems and infrastructures
en consorcio:
Cerrada hace 8 meses | Próxima convocatoria prevista para el mes de
HORIZON-CL3-2022-CS-01-04 Improved monitoring of threats, intrusion detection and response in complex and heterogeneous digital systems and infrastructures
en consorcio:
Cerrada hace 9 meses | Próxima convocatoria prevista para el mes de
HORIZON-CL3-2022-CS-01-04 Transition towards Quantum-Resistant Cryptography
en consorcio: ExpectedOutcome:Projects are expected to contribute to at least three of the following expected outcomes: Measuring, assessing and standard...
Cerrada hace 9 meses | Próxima convocatoria prevista para el mes de
HORIZON-CL3-2022-CS-01-03 Transition towards Quantum-Resistant Cryptography
en consorcio: ExpectedOutcome:Projects are expected to contribute to at least three of the following expected outcomes: Measuring, assessing and standard...
Cerrada hace 2 años | Próxima convocatoria prevista para el mes de
HORIZON-CL3-2022-CS-01-01 Improved monitoring of threats, intrusion detection and response in complex and heterogeneous digital systems and infrastructures
en consorcio: ExpectedOutcome:Projects are expected to contribute to at least three of the following expected outcomes: Improved disruption preparedness...
Cerrada | Próxima convocatoria prevista para el mes de