EPSRC logo
EPSRC Support by Socio-economic Theme in Safe and Secure ICT

EPSRC classifies the research it supports by socio-economic theme. This taxonomy has been used to classify all grants current on 1st January 2003 or received after this date.

Please note that the assignment of a theme to a grant indicates that the theme may apply in whole or in part to the research activity of that grant. This means that the values of grants within a classification should not be totalled to find the total investment in that area or to compare investment between areas of research. The value shown for each grant is always the total awarded, not the proportion attributed to the individual socio-economic theme.

Grant TitlePrincipal
Investigator
OrganisationDepartmentTotal Grant
Value (£)
A correct-by-construction approach to approximate computationMardare, Professor RUniversity of StrathclydeComputer and Information Sciences 692,875
A Framework for Risk-Informed Metrics-Enriched Cybersecurity Playbooks for CNI ResilienceCherdantseva, Dr YCardiff UniversityComputer Science 503,174
AISEC: AI Secure and Explainable by ConstructionAtkey, Dr RAUniversity of StrathclydeComputer and Information Sciences 348,439
AISEC: AI Secure and Explainable by ConstructionKomendantskaya, Professor EHeriot-Watt UniversityS of Mathematical and Computer Sciences 807,165
AISEC: AI Secure and Explainable by ConstructionAspinall, Professor DUniversity of EdinburghSch of Informatics 670,675
An Abstraction-based Technique for Safe Reinforcement LearningBelardinelli, Dr FImperial College LondonComputing 302,082
AppControl: Enforcing Application Behaviour through Type-Based ConstraintsVanderbauwhede, Professor WUniversity of GlasgowSchool of Computing Science 1,483,020
Boolean functions with optimal stability of their cryptographic indicators under restriction of the inputsSalagean, Dr AmLoughborough UniversityComputer Science 335,434
Capable VMsSinger, Dr JUniversity of GlasgowSchool of Computing Science 469,283
CapableVMsTratt, Professor LKings College LondonInformatics 837,189
CapC: Capability C semantics, tools and reasoningBatty, Professor MUniversity of KentSch of Computing 485,168
CAPcelerate: Capabilities for Heterogeneous AcceleratorsJones, Professor TMUniversity of CambridgeComputer Science and Technology 1,202,313
CAP-TEE: Capability Architectures for Trusted ExecutionOswald, Dr D FUniversity of BirminghamSchool of Computer Science 1,000,206
Centre for Secure Information Technologies (CSIT) - Phase 3O'Neill, Professor MQueen's University of BelfastSch of Electronics, Elec Eng & Comp Sci 4,234,764
CHERI for Hypervisors and Operating Systems (CHaOS)Watson, Dr R N MUniversity of CambridgeComputer Science and Technology 878,316
Chrompartments: Hybrid Compartmentalisation for Web BrowsersTratt, Professor LKings College LondonInformatics 1,077,295
Cloud Attestables on Morello Boards (CAMB)Crowcroft, Professor JUniversity of CambridgeComputer Science and Technology 420,654
Construction of Post-quantum Signature Schemes based on LatticesSarkar, Dr SUniversity of WarwickComputer Science 12,340
CyReSE: Cyber Security Research Software EngineeringCarlin, Dr DQueen's University of BelfastSch of Electronics, Elec Eng & Comp Sci 497,158
Design and Verification of Time-Critical Byzantine Fault-Tolerant SystemsRahli, Dr VUniversity of BirminghamSchool of Computer Science 396,533
Dijkstra's Pipe: Timing-Secure Processors by DesignPatras, Dr PUniversity of EdinburghSch of Informatics 535,239
End to End Authentication of Caller ID in Heterogeneous Telephony SystemsHao, Professor FUniversity of WarwickComputer Science 901,040
EnnCore: End-to-End Conceptual Guarding of Neural ArchitecturesCordeiro, Dr LCUniversity of Manchester, TheComputer Science 1,721,560
EPSRC Centre for Doctoral Training in Cyber Security for the EverydayMartin, Professor KRoyal Holloway, Univ of LondonInformation Security 6,323,611
EPSRC Centre for Doctoral Training in CybersecurityPym, Professor DUCLComputer Science 6,063,927
EPSRC Centre for Doctoral Training in Modern Statistics and Statistical Machine LearningGandy, Professor AImperial College LondonMathematics 6,460,316
EPSRC Centre for Doctoral Training in Trust, Identity, Privacy and Security in Large-scale Infrastructures (TIPS-at-Scale)Rashid, Professor AUniversity of BristolComputer Science 6,522,797
Equitable privacyRashid, Professor AUniversity of BristolComputer Science 1,016,817
FlexCap: Exploring Hardware Capabilities in Unikernels and Flexible Isolation OSesOlivier, Dr PUniversity of Manchester, TheComputer Science 264,072
Hardware Security for Approximate ComputingGU, Dr CQueen's University of BelfastSch of Electronics, Elec Eng & Comp Sci 298,063
Holistic Design of Secure Systems on Capability Hardware (HD-Sec)Butler, Professor MUniversity of SouthamptonSch of Electronics and Computer Sci 1,030,183
Interface reasoning for interacting systems (IRIS).Pym, Professor DUCLComputer Science 6,146,075
Invariable generation in finite groups with applications to algorithmic number theoryTracey, Dr GUniversity of WarwickMathematics 162,667
IOTEE: Securing and analysing trusted execution beyond the CPUAtamli, Dr AUniversity of SouthamptonSch of Electronics and Computer Sci 457,328
IOTEE: Securing and analysing trusted execution beyond the CPUOswald, Dr D FUniversity of BirminghamSchool of Computer Science 448,286
M4Secure: Making Memory Management More SecureWang, Professor ZUniversity of LeedsSch of Computing 431,748
M4Secure: Making Memory Management More SecureSinger, Dr JUniversity of GlasgowSchool of Computing Science 457,857
MCPS-VeriSec: Model-based Security of Medical Cyber-Physical SystemsPaoletti, Dr NKings College LondonInformatics 424,397
Morello-HAT: Morello High-Level API and ToolingVanderbauwhede, Professor WUniversity of GlasgowSchool of Computing Science 1,128,654
MUSE: Multi-Modal Software EvolutionDash, Dr SKRoyal Holloway, Univ of LondonInformation Security 421,797
National Edge AI Hub for Real Data: Edge Intelligence for Cyber-disturbances and Data QualityRanjan, Professor RNewcastle UniversitySch of Computing 10,277,846
PETRAS 2Watson, Professor JDMUCLScience, Tech, Eng and Public Policy 13,850,000
PKC-Sec: Security Analysis of Classical and Post-Quantum Public Key Cryptography AssumptionsGranger, Dr RUniversity of SurreyComputing Science 297,923
POST: Protocols, Observabilities and Session TypesYoshida, Professor NUniversity of OxfordComputer Science 1,243,069
Post-Quantum Blockchains Based on FALCON++Ling, Dr CImperial College LondonElectrical and Electronic Engineering 897,476
Post-Quantum Cryptography: a Cryptanalysis ApproachPetit, Dr CUniversity of BirminghamSchool of Computer Science 1,663,949
REPHRAIN: National Research centre on Privacy, Harm Reduction and Adversarial Influence online (Phase II)Rashid, Professor AUniversity of BristolComputer Science 756,638
REPHRAIN: Research centre on Privacy, Harm Reduction and Adversarial Influence onlineRashid, Professor AUniversity of BristolComputer Science 6,972,599
RESICS:Resilience and Safety to attacks in ICS and CPSLupu, Professor ECImperial College LondonComputing 919,122
Safe and secure COncurrent programming for adVancEd aRchiTectures (COVERT)Derrick, Professor JUniversity of SheffieldComputer Science 422,585
Safe and secure COncurrent programming for adVancEd aRchiTectures (COVERT)Dongol, Professor BUniversity of SurreyComputing Science 416,971
Safe and secure COncurrent programming for adVancEd aRchiTectures (COVERT)Batty, Professor MUniversity of KentSch of Computing 374,699
SECCOM: Securing composable hardware platformsGoodacre, Professor JUniversity of Manchester, TheComputer Science 789,633
Secure Smart Contracts with Isabelle/SolidityMarmsoler, Dr DUniversity of ExeterComputer Science 247,844
Securing the Next Billion Consumer Devices on the EdgeHaddadi, Professor HImperial College LondonComputing 1,283,043
Security of Digital Twins in ManufacturingClark, Professor JAUniversity of SheffieldComputer Science 619,963
Session Types for Reliable Distributed Systems (STARDUST)Bocchi, Dr LUniversity of KentSch of Computing 555,120
Session Types for Reliable Distributed Systems (STARDUST)Yoshida, Professor NUniversity of OxfordComputer Science 599,888
Session Types for Reliable Distributed Systems (STARDUST)Gay, Professor SJUniversity of GlasgowSchool of Computing Science 563,806
Social Foundations of CryptographyMedrado, Dr AMLUniversity of WestminsterWestminster Sch of Media & Communication 74,370
Social Foundations of CryptographyAlbrecht, Professor MKings College LondonInformatics 725,498
Social foundations of cryptographyDowling, Dr BUniversity of SheffieldComputer Science 59,617
Taut foliations, representations, and the computational complexity of knot genusYazdi, Dr MKings College LondonMathematics 224,022
Transparent pointer safety: Rust to Lua to OS ComponentsBatty, Professor MUniversity of KentSch of Computing 494,770
TruDetect: Trustworthy Deep-Learning based Hardware Trojan DetectionO'Neill, Professor MQueen's University of BelfastSch of Electronics, Elec Eng & Comp Sci 881,074
TRUSTED: SecuriTy SummaRies for SecUre SofTwarE DevelopmentKhakpour, Dr NNNewcastle UniversitySch of Computing 492,653
TRUSTED: SecuriTy SummaRies for SecUre SofTwarE DevelopmentSchewe, Professor SUniversity of LiverpoolComputer Science 426,375
Turing AI Fellowship: Probabilistic Algorithms for Scalable and Computable Approaches to Learning (PASCAL)Nemeth, Professor CJLancaster UniversityMathematics and Statistics 1,097,295
Two-way automata: limitations and frontiersChistikov, Dr DUniversity of WarwickComputer Science 280,432
UK-Australia Centre in a Secure Internet of Energy: Supporting Electric Vehicle Infrastructure at the "Edge" of the GridRanjan, Professor RNewcastle UniversitySch of Computing 1,511,081
UKRI Centre for Doctoral Training in Safe and Trusted Artificial IntelligenceBlack, Dr EKings College LondonInformatics 7,135,274
Uni-pi: safety, adaptability and resilience in distributed ecosystems, by constructionDardha, Dr OUniversity of GlasgowSchool of Computing Science 409,562
Untargeted Attacks in (Password-Based) CryptographyFarshim, Dr PDurham, University ofComputer Science 265,225
User-controlled hardware security anchors: evaluation and designsRyan, Professor MUniversity of BirminghamSchool of Computer Science 486,082
Verifiably Correct Swarm AttestationDongol, Professor BUniversity of SurreyComputing Science 514,155
Verification of Hardware Concurrency via Model Learning (CLeVer)Silva, Professor AUCLComputer Science 692,958
VeTSpec: Verified Trustworthy Software SpecificationGardner, Professor PImperial College LondonComputing 1,579,794

Total Number of Grants: 77
Total Value of Grants: £117,972,924

The grant value may include the cost of access to facilities (these funds are not awarded to the grant holding organisation).