DS-01-2016
Assurance and Certification for Trustworthy and Secure ICT systems, services and components -
About the connections
The graph above was generated based on the following links
Call text (as on F&T portal)
View on F&T portalThe constant discovery of vulnerabilities in ICT components, applications, services and systems is placing our entire digital society at risk. Insecure ICT is also imposing a significant cost on users (individuals and organisations) who have to mitigate the resulting risk by implementing additional technical and procedural measures which are resource consuming.
Smart systems, highly connected cyber-physical systems (CPS) are introducing a high dynamism in the system to develop and validate. Hence, CPS are evolving in a complex and dynamic environment, making safety-critical decisions based on information from other systems not known during development.
Another key challenge is posed by domains, such as medical devices, critical infrastructure facilities, and cloud data centres, where security is deeply intertwined and a prerequisite for other trustworthiness aspects such as safety and privacy.
The challenges are further intensified by the increasing trend of using third party components for critical infrastructures, by the ubiquity of embedded systems and the growing uptake of IoT as well as the deployment of decentralized and virtualized architectures.
In order to tackle these challenges, there is a need of appropriate assurances that our ICT systems are secure and trustworthy by design as well as a need of certified levels of assurance where security is regarded as the primary concern. Likewise, target architectures and methods improving the efficiency of assurance cases are needed in order to lower their costs.
Scope
a. Research and Innovation Actions - Assurance
Providing assurance is a complex task, requiring the development of a chain of evidence and specific techniques during all the phases of the ICT Systems Development Lifecycle (SDLC for short: e.g. design verification, testing, and runtime verification and enforcement) including the validation of individual devices and components. These techniques are complementary yet all necessary, each of them independently contributing towards improving security assurance. It includes methods for reliability and quality development and validation of highly dynamic systems.
Proposals may address security, reliability and safety assurance at individual phases of the SDLC and are expected to cover at least one of the areas identified below, depending on their relevance to the proposal overall objectives:
- Security requirements specification and formalization;
- Security properties formal verification and proofs at design and runtime
- Secure software coding;
- Assurance-aware modular or distributed architecting and algorithmic;
- Software code review, static and dynamic security testing;
- Automated tools for system validation and testing;
- Attack and threat modelling;
- Vulnerability analysis;
- Vendor (third-party) application security testing;
- Penetration testing;
- Collection and management of evidence for assessing security and trustworthiness;
- Operational assurance, verification and security policy enforcement;
- Adaptive security by design and during operation.
Proposal should strive to quantify their progress beyond the state of the art in terms of efficiency and effectiveness. Particular importance within this context should be placed on determining the appropriate metrics.
Proposals should take into account the changing threat landscape, where targeted attacks and advanced persistent threats assume an increasingly more important role and address the challenge of security assurance in state-of-the-art development methods and deployment models including but not limited to solutions focussing on reducing the cost and complexity of assurance in large-scale systems.
Proposals should include a clear standardisation plan at submission time.
The Commission considers that proposals requesting a contribution from the EU between EUR 3 and 4 million would allow this specific challenge to be addressed appropriately. Nonetheless, this does not preclude submission and selection of proposals requesting other amounts.
The outcome of the proposals are expected to lead to development up to Technology Readiness Level (TRL) 3 to 5; please see part G of the General Annexes.
b. Innovation Actions – Security Certification
Proposals should address the challenge of improving the effectiveness and efficiency of existing security certification processes for state-of-the-art ICT components and products including the production and delivery of the corresponding guidance materials.
In terms of effectiveness, proposals should address, amongst other factors, emerging threats, compositional certification and reuse of components in the context of certified systems and certification throughout the operational deployment of a product or a service.
In terms of efficiency, proposals should strive to reduce the cost and duration of the certification process.
Proposals may address security certification in any area of their choice. Consortia submitting proposals are expected to approach the selected topic as widely as possible including all necessary actors – e.g. industry, academia, certification laboratories - and involve the relevant certification authorities from at least three Member States in order to achieve added value at a European level.
Proposals are encouraged to work towards moderate to high assurance level protection profiles as a way to validate their results.
The Commission considers that proposals requesting a contribution from the EU between EUR 3 and 4 million would allow this specific challenge to be addressed appropriately. Nonetheless, this does not preclude submission and selection of proposals requesting other amounts.
The outcome of the proposals are expected to lead to development up to Technology Readiness Level (TRL) 6 to 7; please see part G of the General Annexes.
c. Coordination and Support Actions
To complement the research and innovation activities in security assurance and certification in this topic, support and coordination actions should address the following:
Building trustworthiness: economic, legal and social aspects of security assurance and certification
- Study in depth the economic and legal aspects related to assurance and certification (including European-wide labelling), EU and International regulatory aspects;
- Explore and identify the interplay of relevant social, cultural, behavioural, gender and ethical factors with ICT systems with regards to their trustworthiness and security, actual or perceived
- Identify barriers and incentives in the market for certified products in the consumer and/or enterprise market;
- Produce a comprehensive cost/benefit model for security assurance and certification;
Engage with multidisciplinary communities and stakeholders.
The Commission considers that proposals requesting a contribution from the EU of up to EUR 1 million would allow this specific challenge to be addressed appropriately. Nonetheless, this does not preclude submission and selection of proposals requesting other amounts.
Expected Impact:- European ICT offering a higher level of assurance compared to non-European ICT products and services.
- ICT products and services more compliant with relevant European security and/or privacy regulations.
- ICT with a higher level of security assurance at marginally additional cost.
- Facilitation of mutual recognition of security certificates across the EU.
- Increased market uptake of secure ICT products.
- Increased user trust in ICT products and services.
- Reduction of negative externalities associated with deployment of insecure ICT.
- More resilient critical infrastructures and services.
- Progress beyond the state-of-the-art in the effectiveness and efficiency of the areas addressed by the proposals.
News flashes
An overview of the evaluation results (flash call info) is now available under the ‘Additional documents’ section on the topic pages.
A total of 160 proposals have been submitted in response to this call. The number of proposals for each topic is shown below including the indicative budget of the topic:
DS-07-2017-RIA: 63 proposals (indicative budget: 10 M€);DS-07-2016-IA: 15 proposals (indicative budget: 8 M€);DS-08-2017: 82 proposals (indicative budget: 17.6 M€);
The evaluation of the proposals will start by mid-September and will be closed by the end of the year. Applicants will be informed on the outcome of the evaluations in mid-January 2018.
An overview of the evaluation results (called 'Flash Call Info') of the topic DS-06-2017of H2020-DS-LEIT-2017 call is now available here or under the 'Topic conditions & documents' section on the correspondant topic page.
The submission of proposals to the H2020-DS-LEIT-2017 call closed on 25 April 2017. 34 RIA proposals were submitted to this call's DS-06-2017 topic.
An overview of the evaluation results (flash call info) is now available under the tab ‘Call documents’ for DS-02, DS-04 and DS-05.
A total of 80 proposals were submitted in response to this call. The number of proposals for each topic is shown below including the indicative budget of the topic:
- DS-02-2016: 45 proposals (indicative budget: 22 M€);
- DS-04-2016: 22 proposals (indicative budget: 4 M€);
- DS-05-2016: 13 proposals (indicative budget: 3 M€);
The evaluation of the proposals is planned to start by mid-September 2016 and will be closed by the end of December 2016. Applicants will be informed on the outcome of the evaluations before the end of January 2017.
An overview of the evaluation results (flash call info) for the topic DS-01-2016 that closed on 12 April 2016 is now available here or under the ‘Topic conditions & documents’ section on each topic page.
A revised version of the Work programme has been adopted for 2016-2017 on July 25 2016. The main changes concern:
- New provisions on Open Access Data have been added for 2017 calls with an opening date on or after 26/07/2016.
- Topic title and long description have changed DS-07-2017, DS-08-2017.
- Budget has changed for DS-08-2017.
By the deadline of 12 April 2016, 17:00 CEST, 37 Proposals were submitted to topicDS-01-2016:• 28 Research & Innovation Actions (RIA)referring to "Assurance"• 4 are Innovation Actions (IA)referring to "Security Certification" and• 5 are Coordination & Support Actions (CSA),
Publication date: 2015-10-14 (9 years ago)
Opening date: 2015-10-20 (9 years ago)
Closing date: 2016-04-12 (9 years ago)
Procedure: single-stage
Budget: 1000000
Expected grants: not specified
This call topic has been appended 13 times by the EC with news.
-
2018-01-16
an overview of the evaluation results (f... -
2017-08-25
a total of 160 proposals have been submi... -
2017-08-11
an overview of the evaluation results (c... -
2017-04-26
the submission of proposals to the h2020... -
2017-03-01
the submission session is now available... -
2017-01-20
an overview of the evaluation results (f... -
2016-12-08
the submission session is now available... -
2016-08-30
a total of 80 proposals were submitted i... -
2016-07-29
an overview of the evaluation results (f... -
2016-07-27
a revised version of the work programme... -
2016-04-14
by the deadline of 12 april 2016, 17:00... -
2016-03-15
the submission session is now available... -
2015-10-20
the submission session is now available...
H2020-DS-2016-2017
Call topics are often grouped together in a call. Sometimes this is for a thematic reason, but often it is also for practical reasons.
There are 7 other topics in this call:
Showing the latest information. Found 1 version of this call topic in the F&T portal.
Information from
- 2024-03-30_14-22-44
Annotations (will be publicly visible when approved)
Events
Events are added by the ideal-ist NCP community and are hand-picked. If you would like to suggest an event, please contact idealist@ffg.at.
Call topic timeline
-
Work programme available
- 9 years agoThe call topics are published first in the Work Programme, which is available a while before the call opens. By following up the Work Programme publications, you can get a headstart.
-
Publication date
- 9 years agoThe call was published on the Funding & Tenders Portal.
-
Opening date
- 9 years agoThe call opened for submissions.
-
Closing date
- 9 years agoDeadline for submitting a project.
-
Time to inform applicants Estimate
- 8 years agoThe maximum time to inform applicants (TTI) of the outcome of the evaluation is five months from the call closure date.
-
Sign grant agreement Estimate
- 8 years agoThe maximum time to sign grant agreements (TTG) is three months from the date of informing applicants.
-
Today
Funded Projects
Loading...
Project information comes from CORDIS (for Horizon 2020 and Horizon Europe) and will be sourced from F&T Portal (for Digital Europe projects)