EPSRC logo
EPSRC Support by Socio-economic Theme in Safe and Secure ICT

EPSRC classifies the research it supports by socio-economic theme. This taxonomy has been used to classify all grants current on 1st January 2003 or received after this date.

Please note that the assignment of a theme to a grant indicates that the theme may apply in whole or in part to the research activity of that grant. This means that the values of grants within a classification should not be totalled to find the total investment in that area or to compare investment between areas of research. The value shown for each grant is always the total awarded, not the proportion attributed to the individual socio-economic theme.

Grant TitlePrincipal
Investigator
OrganisationDepartmentTotal Grant
Value (£)
A Framework for Risk-Informed Metrics-Enriched Cybersecurity Playbooks for CNI ResilienceCherdantseva, Dr YCardiff UniversityComputer Science 503,174
AISEC: AI Secure and Explainable by ConstructionAtkey, Dr RAUniversity of StrathclydeComputer and Information Sciences 348,439
AISEC: AI Secure and Explainable by ConstructionKomendantskaya, Dr EHeriot-Watt UniversityS of Mathematical and Computer Sciences 807,165
AISEC: AI Secure and Explainable by ConstructionAspinall, Professor DUniversity of EdinburghSch of Informatics 670,675
AppControl: Enforcing Application Behaviour through Type-Based ConstraintsVanderbauwhede, Professor WUniversity of GlasgowSchool of Computing Science 1,483,020
AutoPaSS: Automatic Verification of Complex Privacy Requirements in Unbounded-Size Secure SystemsBoureanu, Professor ICUniversity of SurreyComputing Science 303,951
Boolean functions with optimal stability of their cryptographic indicators under restriction of the inputsSalagean, Dr ALoughborough UniversityComputer Science 335,434
Boosting power efficiency of physical-layer secured MIMO communicationsDing, Dr YHeriot-Watt UniversitySch of Engineering and Physical Science 251,815
Bridging the Gap Between Lattice Coding and Lattice Cryptography - Post-Quantum CryptographyLing, Dr CImperial College LondonElectrical and Electronic Engineering 436,303
Bridging the Gap Between Lattice Coding and Lattice Cryptography - Post-Quantum CryptographyAlbrecht, Professor MRoyal Holloway, Univ of LondonInformation Security 379,964
CaMELot: Catching and Mitigating Event-Loop Concurrency IssuesMarr, Dr SUniversity of KentSch of Computing 209,756
Capabilities for CodersSinger, Dr JUniversity of GlasgowSchool of Computing Science 102,787
Capable VMsSinger, Dr JUniversity of GlasgowSchool of Computing Science 469,283
CapableVMsTratt, Professor LKings College LondonInformatics 837,189
CapC: Capability C semantics, tools and reasoningBatty, Professor MUniversity of KentSch of Computing 485,168
CAPcelerate: Capabilities for Heterogeneous AcceleratorsJones, Professor TMUniversity of CambridgeComputer Science and Technology 1,199,866
CAP-TEE: Capability Architectures for Trusted ExecutionOswald, Dr D FUniversity of BirminghamSchool of Computer Science 1,000,206
Centre for Secure Information Technologies (CSIT) - Phase 3O'Neill, Professor MQueen's University of BelfastSch of Electronics, Elec Eng & Comp Sci 3,360,637
CHERI for Hypervisors and Operating Systems (CHaOS)Watson, Dr R N MUniversity of CambridgeComputer Science and Technology 875,939
Chrompartments: Hybrid Compartmentalisation for Web BrowsersTratt, Professor LKings College LondonInformatics 1,077,295
Cloud Attestables on Morello Boards (CAMB)Crowcroft, Professor JUniversity of CambridgeComputer Science and Technology 420,654
CloudCAP: Capability-based Isolation for Cloud Native ApplicationsPietzuch, Professor PRImperial College LondonComputing 879,242
CodeCPS: Correct-by-Design Estimation and Control of Cyber-Physical SystemsSoudjani, Dr SNewcastle UniversitySch of Computing 388,069
Combining Viewpoints in Quantum Theory (Ext.)Heunen, Dr CUniversity of EdinburghSch of Informatics 529,579
Cyber Security for the Vehicles of TomorrowGarcia, Professor FUniversity of BirminghamSchool of Computer Science 1,127,781
CyReSE: Cyber Security Research Software EngineeringCarlin, Dr DQueen's University of BelfastSch of Electronics, Elec Eng & Comp Sci 497,158
DeepSecurity - Applying Deep Learning to Hardware SecurityO'Neill, Professor MQueen's University of BelfastSch of Electronics, Elec Eng & Comp Sci 765,827
Design and Verification of Time-Critical Byzantine Fault-Tolerant SystemsRahli, Dr VUniversity of BirminghamSchool of Computer Science 396,533
Dijkstra's Pipe: Timing-Secure Processors by DesignNagarajan, Dr VUniversity of EdinburghSch of Informatics 535,239
End to End Authentication of Caller ID in Heterogeneous Telephony SystemsHao, Professor FUniversity of WarwickComputer Science 901,040
EnnCore: End-to-End Conceptual Guarding of Neural ArchitecturesCordeiro, Dr LCUniversity of Manchester, TheComputer Science 1,721,560
EPSRC Centre for Doctoral Training in Cyber Security for the EverydayMartin, Professor KRoyal Holloway, Univ of LondonInformation Security 6,003,076
EPSRC Centre for Doctoral Training in CybersecurityPym, Professor DUCLComputer Science 5,771,944
EPSRC Centre for Doctoral Training in Modern Statistics and Statistical Machine LearningGandy, Professor AImperial College LondonMathematics 6,202,023
EPSRC Centre for Doctoral Training in Trust, Identity, Privacy and Security in Large-scale Infrastructures (TIPS-at-Scale)Rashid, Professor AUniversity of BristolComputer Science 6,276,736
Equitable privacyRashid, Professor AUniversity of BristolComputer Science 1,016,817
FlexCap: Exploring Hardware Capabilities in Unikernels and Flexible Isolation OSesOlivier, Dr PUniversity of Manchester, TheComputer Science 264,072
HAMLET: Hardware Enabled Meta-Tracing (ext.)Tratt, Professor LKings College LondonInformatics 922,997
Hardware Security for Approximate ComputingGU, Dr CQueen's University of BelfastSch of Electronics, Elec Eng & Comp Sci 298,063
Higher-order Constrained Horn Clauses: A New Approach to Verifying Higher-order ProgramsRamsay, Dr S JUniversity of BristolComputer Science 366,931
Higher-order Constrained Horn Clauses: A New Approach to Verifying Higher-order ProgramsMurawski, Dr AUniversity of OxfordComputer Science 409,019
Holistic Design of Secure Systems on Capability Hardware (HD-Sec)Butler, Professor MUniversity of SouthamptonSch of Electronics and Computer Sci 1,030,183
Interface reasoning for interacting systems (IRIS).Pym, Professor DUCLComputer Science 6,146,075
Invariable generation in finite groups with applications to algorithmic number theoryTracey, Dr GUniversity of BirminghamSchool of Mathematics 205,496
IOSEC - Protection and Memory Safety for Input/Output SecurityWatson, Dr R N MUniversity of CambridgeComputer Science and Technology 511,891
Isaac Newton Institute for Mathematical SciencesTillmann, Professor UUniversity of CambridgeIsaac Newton Institute (Math Science) 11,570,267
MCPS-VeriSec: Model-based Security of Medical Cyber-Physical SystemsPaoletti, Dr NKings College LondonInformatics 424,397
Morello-HAT: Morello High-Level API and ToolingVanderbauwhede, Professor WUniversity of GlasgowSchool of Computing Science 1,128,654
MUSE: Multi-Modal Software EvolutionDash, Dr SKRoyal Holloway, Univ of LondonInformation Security 421,797
PETRAS 2Watson, Professor JDMUCLScience, Tech, Eng and Public Policy 13,850,000
PKC-Sec: Security Analysis of Classical and Post-Quantum Public Key Cryptography AssumptionsGranger, Dr RUniversity of SurreyComputing Science 297,923
POST: Protocols, Observabilities and Session TypesYoshida, Professor NImperial College LondonComputing 1,462,802
Post-Quantum Cryptography: a Cryptanalysis ApproachPetit, Dr CUniversity of BirminghamSchool of Computer Science 1,663,949
Programming as Conversation: Type-Driven Development in ActionBrady, Dr ECUniversity of St AndrewsComputer Science 367,276
REPHRAIN: Research centre on Privacy, Harm Reduction and Adversarial Influence onlineRashid, Professor AUniversity of BristolComputer Science 6,972,599
RE-PRESENT: Automatic Repair of Presentation Failures in Web ApplicationsMcMinn, Professor PSUniversity of SheffieldComputer Science 27,774
SAUSE: Secure, Adaptive, Usable Software EngineeringNuseibeh, Professor BThe Open UniversityFaculty of Sci, Tech, Eng & Maths (STEM) 1,330,879
SCARV: a side-channel hardened RISC-V platformPage, Dr DUniversity of BristolComputer Science 1,024,324
SCorCH : Secure Code for Capability HardwareMelham, Professor TUniversity of OxfordComputer Science 312,916
SCorCH: Secure Code for Capability HardwareReger, Dr GUniversity of Manchester, TheComputer Science 1,034,990
Securing the Next Billion Consumer Devices on the EdgeHaddadi, Dr HImperial College LondonComputing 1,283,043
Security of Digital Twins in ManufacturingClark, Professor JAUniversity of SheffieldComputer Science 619,963
Serious Coding: A Game Approach To Security For The New Code-CitizensBaillie, Professor LHeriot-Watt UniversityS of Mathematical and Computer Sciences 998,239
Session Types for Reliable Distributed Systems (STARDUST)Yoshida, Professor NImperial College LondonComputing 697,651
Session Types for Reliable Distributed Systems (STARDUST)Bocchi, Dr LUniversity of KentSch of Computing 555,120
Session Types for Reliable Distributed Systems (STARDUST)Gay, Professor SJUniversity of GlasgowSchool of Computing Science 563,806
SIPP - Secure IoT Processor Platform with Remote AttestationO'Neill, Professor MQueen's University of BelfastSch of Electronics, Elec Eng & Comp Sci 1,294,888
String Constraint Solving with Real-World Regular ExpressionsHague, Dr MRoyal Holloway, Univ of LondonComputer Science 393,618
Taut foliations, representations, and the computational complexity of knot genusYazdi, Dr MKings College LondonMathematics 224,022
Transparent pointer safety: Rust to Lua to OS ComponentsBatty, Professor MUniversity of KentSch of Computing 494,770
Turing AI Fellowship: Probabilistic Algorithms for Scalable and Computable Approaches to Learning (PASCAL)Nemeth, Professor CJLancaster UniversityMathematics and Statistics 1,097,295
UK-Australia Centre in a Secure Internet of Energy: Supporting Electric Vehicle Infrastructure at the "Edge" of the GridRanjan, Professor RNewcastle UniversitySch of Computing 1,511,081
UKRI Centre for Doctoral Training in Safe and Trusted Artificial IntelligenceLuck, Professor MKings College LondonInformatics 6,898,907
Untargeted Attacks in (Password-Based) CryptographyFarshim, Dr PDurham, University ofComputer Science 265,225
User-controlled hardware security anchors: evaluation and designsRyan, Professor MUniversity of BirminghamSchool of Computer Science 486,082
Verifiably Correct Swarm AttestationDongol, Dr BUniversity of SurreyComputing Science 514,155
Verification of Hardware Concurrency via Model Learning (CLeVer)Silva, Professor AUCLComputer Science 692,958
VeTSpec: Verified Trustworthy Software SpecificationGardner, Professor PImperial College LondonComputing 1,579,794

Total Number of Grants: 78
Total Value of Grants: £120,787,232

The grant value may include the cost of access to facilities (these funds are not awarded to the grant holding organisation).