EPSRC logo
EPSRC Support by Socio-economic Theme in Safe and Secure ICT

EPSRC classifies the research it supports by socio-economic theme. This taxonomy has been used to classify all grants current on 1st January 2003 or received after this date.

Please note that the assignment of a theme to a grant indicates that the theme may apply in whole or in part to the research activity of that grant. This means that the values of grants within a classification should not be totalled to find the total investment in that area or to compare investment between areas of research. The value shown for each grant is always the total awarded, not the proportion attributed to the individual socio-economic theme.

Grant TitlePrincipal
OrganisationDepartmentTotal Grant
Value (£)
Automatic repair of natural source codeMatragkas, Dr NUniversity of YorkComputer Science 131,677
Automatically Detecting and Surviving Exploitable Compiler BugsCadar, Dr CImperial College LondonDept of Computing 672,083
Bridging the Gap Between Lattice Coding and Lattice Cryptography - Post-Quantum CryptographyAlbrecht, Dr MRoyal Holloway, Univ of LondonInformation Security 379,964
Bridging the Gap Between Lattice Coding and Lattice Cryptography - Post-Quantum CryptographyLing, Dr CImperial College LondonElectrical and Electronic Engineering 436,303
Citizen ForensicsBandara, Professor AKOpen UniversityFaculty of Sci, Tech, Eng & Maths (STEM) 1,093,594
Combining Viewpoints in Quantum Theory (Ext.)Heunen, Dr CUniversity of EdinburghSch of Informatics 529,579
Cyber Security for the Vehicles of TomorrowGarcia, Professor FUniversity of BirminghamSchool of Computer Science 1,127,781
CyPhyAssure: Compositional Safety Assurance for Cyber-Physical SystemsFoster, Dr SDUniversity of YorkComputer Science 562,549
DADAMcAuley, Professor DUniversity of NottinghamHorizon Digital Economy Research 1,011,787
DeepSecurity - Applying Deep Learning to Hardware SecurityO'Neill, Professor MQueen's University of BelfastSch of Electronics, Elec Eng & Comp Sci 765,827
Exploiting Defect Prediction for Automatic Software Repair (Fixie)Woodward, Dr J RQueen Mary University of LondonSch of Electronic Eng & Computer Science 242,011
Exploiting Defect Prediction for Automatic Software Repair (Fixie)Hall, Professor TLancaster UniversityComputing & Communications 367,238
Exploiting Defect Prediction for Automatic Software Repair (Fixie)Bowes, Dr DHUniversity of Central LancashireSch of Physical Sciences and Computing 244,142
Exploiting interference for physical layer security in 5G networks [CI-PHY] (EPSRC-FNR)Masouros, Dr CUCLElectronic and Electrical Engineering 626,096
Fast Runtime Verification via Machine LearningGrigore, Dr RUniversity of KentSch of Computing 100,918
Improving Protocol Standards for a more Trustworthy InternetPerkins, Dr CUniversity of GlasgowSchool of Computing Science 232,145
Interface reasoning for interacting systems (IRIS).Pym, Professor DUCLComputer Science 6,146,075
IOSEC - Protection and Memory Safety for Input/Output SecurityWatson, Dr R N MUniversity of CambridgeComputer Science and Technology 511,891
Isaac Newton Institute for Mathematical SciencesAbrahams, Professor IDUniversity of CambridgeIsaac Newton Institute (Math Science) 11,570,267
Isogeny-based cryptography: from theory to practicePetit, Dr CUniversity of BirminghamSchool of Computer Science 327,745
PETRAS 2Watson, Professor JDMUCLScience, Tech, Eng and Public Policy 13,850,000
Provably Secure Decisions Based on Potentially Malicious Trust RatingsMuller, Dr T J CUniversity of OxfordComputer Science 92,902
RCUK Catapult Researchers in Residence (Transport Sys.) - Securing Intelligent Mobility: Towards Real Time Interventions & a Resilient Cyber CultureHills, Dr MUniversity of NorthamptonFaculty of Business and Law 50,000
SAUSE: Secure, Adaptive, Usable Software EngineeringNuseibeh, Professor BOpen UniversityFaculty of Sci, Tech, Eng & Maths (STEM) 1,330,879
SCARV: a side-channel hardened RISC-V platformPage, Dr DUniversity of BristolComputer Science 1,024,324
Understanding Information Leakage in Searchable EncryptionWarinschi, Professor BUniversity of BristolComputer Science 22,020
User-controlled hardware security anchors: evaluation and designsRyan, Professor MUniversity of BirminghamSchool of Computer Science 486,082
VeTSpec: Verified Trustworthy Software SpecificationGardner, Professor PImperial College LondonDept of Computing 1,579,794

Total Number of Grants: 28
Total Value of Grants: £45,515,672

The grant value may include the cost of access to facilities (these funds are not awarded to the grant holding organisation).