SU-ICT-02-2020

Building blocks for resilience in evolving ICT systems -

⚫ indicates current topic
Node background color indicates the call topic status
Double click on a topic to center information around it.
Node size is proportional to distance from the current topic

About the connections

The graph above was generated based on the following links

  • ICT-32-2014
    Cybersecurity, Trustworthy ICT

    MOTIVATION These two topics address many of the same problems, like security by design, although SU-ICT-02 is more detailed

  • Update link information
    Be aware that editing a link text will make it have to pass to quality control again before it will be publicly visible (unless you are an admin)
    Type
    Motivation NCP (only) comment
  • SU-ICT-01-2018
    Dynamic countering of cyber-attacks

    MOTIVATION There are many common issues in these topics, such as assurance, validation, vulnerabilities, threat models.

  • Update link information
    Be aware that editing a link text will make it have to pass to quality control again before it will be publicly visible (unless you are an admin)
    Type
    Motivation NCP (only) comment

Call text (as on F&T portal)

View on F&T portal
Specific Challenge:

Algorithms, software and hardware systems must be designed having security, privacy, data protection, fault tolerance and accountability[1] in mind from their design phase in a measurable manner, taking into account future-proof, advanced cryptographic means. Relevant challenges include: (a) to develop mechanisms that measure the performance of ICT systems with regards to cybersecurity and privacy and (b) to enhance control and trust of the consumer of digital products and services with innovative tools aiming to ensure the accountability of the security and privacy levels in the algorithms, in the software, and ultimately in the ICT systems, products and services across the supply chain.

Scope

Proposals are invited against at least one of the following three subtopics:

a) Cybersecurity/privacy audit, certification and standardisation

Innovative approaches to (i) design and develop automated security validation and testing, exploiting the knowledge of architecture, code, and development environments (e.g. white box) (ii) design and develop automated security verification at code level, focusing on scalable taint analysis, information-flow analysis, control-flow integrity, security policy, and considering the relation to secure development lifecycles, (iii) develop mechanisms, key performance indicators and measures that ease the process of certification at the level of services and (iv) develop mechanisms to better audit and analyse open source and/or open license software, and ICT systems with respect to cybersecurity and digital privacy. These approaches may be accompanied by creating information bases to measure and assess the security of digital assets. Proposals should make use of existing standards to the extent possible, and should strive to contribute to relevant standardisation efforts.

b) Trusted supply chains of ICT systems

Innovative approaches to (i) develop advanced, evidence based, dynamic methods and tools for better forecasting, detecting and preventing propagated vulnerabilities, (ii) estimate both dynamically and accurately supply chain cyber security and privacy risks, (iii) design and develop security, privacy and accountability measures and mitigation strategies for all entities involved in the supply chain, (iv) design and develop techniques, methods and tools to better audit complex algorithms (e.g. search engines), interconnected ICT components/systems (v) devise methods to develop resilient systems out of potentially insecure components and (vi) devise security assurance methodologies and metrics to define security claims for composed systems and certification methods, allowing harmonisation and mutual recognition based primarily on evidence and not only on trust.

The trusted supply chain for ICT systems/components should be considered by proposals in its entirety, in particular by addressing the IoT ecosystems/devices that are part of the supply chain.

c) Designing and developing privacy-friendly and secure software and hardware

Innovative approaches to establish methods and tools for (i) security and privacy requirements engineering (including dynamic threat modelling, dynamic attack trees, attack ontologies, dynamic taxonomies and dynamic, evidence based risk analysis), (ii) embedded algorithmic accountability (in order to monitor the security, privacy and transparency of the algorithms/software/systems/services), (iii) system-wide consistency including connection between models, security/privacy/accountability objectives, policies, and functional implementations, (iv) metrics to assess a secure, reliable and privacy-friendly development, (v) secure, privacy-friendly and accountability-enabled programming languages (including machine languages), hardware design languages, development frameworks, as well as secure compilation and execution, (vi) novel, secure and privacy-friendly IoT architectures enabling consistent trustworthy and accountable authentication, authorization and accounting services across IoT devices/ecosystems with enhancement of Public Key Infrastructures (PKIs) aiming to support PKI services (e.g. registration, revocation) for IoT devices.

For each of the sub-topics above, the outcome of the proposals is expected to lead to development up to Technology Readiness level (TRL) 5.

The Commission considers that proposals requesting a contribution from the EU of between EUR 4 and 5 million would allow this area to be addressed appropriately. Nonetheless, this does not preclude submission and selection of proposals requesting other amounts.

For grants awarded under this topic for Research and Innovation Action the Commission or Agency may object to a transfer of ownership or the exclusive licensing of results to a third party established in a third country not associated to Horizon 2020. The respective option of Article 30.3 of the Model Grant Agreement will be applied.

Expected Impact:

Short/medium term

  • Improved market opportunities for the EU vendors of security components.
  • Increased trust both by developers using/integrating the ICT components and by the end-users of IT systems and services.
  • Protect the privacy of citizens and trustworthiness of ICT .
  • Acceleration of the development and implementation of certification processes.

Long term

  • Advanced cybersecurity products and services will be developed improving trust in the Digital Single Market.
  • The use of more harmonized certification schemes will increase the business cases for cybersecurity services as they will become more reliable.
  • Validation platforms will provide assessments with less effort compared with nowadays and assure a better compliance with relevant regulations and standards.
Cross-cutting Priorities:

Contractual Public-Private Partnerships (cPPPs)Cybersecurity

[1]“Accountability” in the meaning ISO IEC/2015.

News flashes

2020-03-27

An overview of the evaluation results of topic SU-ICT-02-2020 is now available under section Topic conditions and documents - Additional documents.

2019-11-27

On 19 November 2019, call H2020-SU-ICT-2019 closed at 17:00.

82 proposals were submitted in totalto thetopic SU-ICT-02-2020 (RIA).

2019-10-08

Please note that a Guide to ICT-related activities in H2020 work programme 2018-20 has been published in the Additional documents section in Topic conditions and documents ofthis topic page.

2019-10-08

Please note that a Guide to ICT-related activities in H2020 work programme 2018-20 has been published in the Additional documents section in Topic conditions and documents oftopic page SU-ICT-02-2020.

2019-07-25
The submission session is now available for: SU-ICT-02-2020(RIA)
2019-03-06

An overview of the evaluation results (called 'Call results') of topic SU-ICT-04-2018 is now available under section Topic conditions and documents - Additional documents.

2018-12-06

An overview of the evaluation results (called 'Call results') of topic SU-ICT-01-2018 is now available under section Topic conditions and documents - Additional documents.

2018-11-16

CallH2020-SU-ICT-2018-3 has closed on14November 2018.

3proposals have been submitted to topic SU-ICT-04-2018 (IA).
2018-08-28

CallH2020-SU-ICT-2018 has closed on 28 August 2018.

51proposals have been submitted to topic SU-ICT-01-2018 (IA).
2018-08-21

An overview of the evaluation results (called 'Call results') of the topic SU-ICT-03-2018 is now available under section Topic conditions and documents - Additional documents.

2018-07-26
The submission session is now available for: SU-ICT-04-2019(IA)
2018-05-30

On 29 May 2018, call H2020-SU-ICT-2018-2 closed at 17:00.

13 proposals were submitted in totalto thetopic SU-ICT-03-2018 (RIA).

2018-03-15
The submission session is now available for: SU-ICT-01-2018(IA)
2018-03-01

We herewith bring to the attention of applicants that they are permitted to remove the page break on the cover page of the technical annex's template. This means that the text of the proposal can start on the cover page.

2018-02-01
The submission session is now available for: SU-ICT-03-2018(RIA)
call topic details
Call status: Closed
Publication date: 2017-10-27 (7 years ago)
Opening date: 2019-07-25 (5 years ago)
Closing date: 2019-11-19 (5 years ago)
Procedure: single-stage

Budget: 47000000
Expected grants: not specified
News flashes

This call topic has been appended 15 times by the EC with news.

  • 2020-03-27
    an overview of the evaluation results...
  • 2019-11-27
    on 19 november 2019, call h2020-su-ict-2...
  • 2019-10-08
    please note that a guide to ict-related...
  • 2019-10-08
    please note that a guide to ict-related...
  • 2019-07-25
    the submission session is now available...
  • 2019-03-06
    an overview of the evaluation results (c...
  • 2018-12-06
    an overview of the evaluation results (c...
  • 2018-11-16
    callh2020-su-ict-2018-3 has closed on14n...
  • 2018-08-28
    callh2020-su-ict-2018 has closed on 28 a...
  • 2018-08-21
    an overview of the evaluation results (c...
  • 2018-07-26
    the submission session is now available...
  • 2018-05-30
    on 29 may 2018, call h2020-su-ict-2018-2...
  • 2018-03-15
    the submission session is now available...
  • 2018-03-01
    we herewith bring to the attention of ap...
  • 2018-02-01
    the submission session is now available...
Call

H2020-SU-ICT-2018-2020

Call topics are often grouped together in a call. Sometimes this is for a thematic reason, but often it is also for practical reasons.

There are 3 other topics in this call:

Source information

Showing the latest information. Found 1 version of this call topic in the F&T portal.

Information from

  • 2024-03-30_14-24-13

Annotations (will be publicly visible when approved)

You must be logged in to add annotations
No annotations yet

Events

This is just a very first implementation, better visualisation coming

Events are added by the ideal-ist NCP community and are hand-picked. If you would like to suggest an event, please contact idealist@ffg.at.

Call topic timeline

What phase of the topic timeline are we in? This timeline contains some suggestions on what are realistic actions you should or could take at this moment. The timeline is based on the information provided by the call topic.
  1. Work programme available

    - 7 years ago

    The call topics are published first in the Work Programme, which is available a while before the call opens. By following up the Work Programme publications, you can get a headstart.

  2. Publication date

    - 7 years ago

    The call was published on the Funding & Tenders Portal.

  3. Opening date

    - 5 years ago

    The call opened for submissions.

  4. Closing date

    - 5 years ago

    Deadline for submitting a project.

  5. Time to inform applicants Estimate

    - 5 years ago

    The maximum time to inform applicants (TTI) of the outcome of the evaluation is five months from the call closure date.

  6. Sign grant agreement Estimate

    - 4 years ago

    The maximum time to sign grant agreements (TTG) is three months from the date of informing applicants.

  7. Today

Funded Projects

Loading...

Project information comes from CORDIS (for Horizon 2020 and Horizon Europe) and will be sourced from F&T Portal (for Digital Europe projects)

Bubbles

This call topic is part of: