EPSRC logo
EPSRC Support by Research Area in Verification and Correctness

Research areas are used to describe EPSRC's portfolio of excellent long term research and high quality postgraduate training.

Grants are classified using one or more research areas. All the grants listed below have some relevance to this research area. The value of the investment is the total awarded by EPSRC and does not reflect the proportion assigned to this research area.

We always try to ensure that grants on the web contains the most recent information but it is possible that some might be slightly out of date.

Grant TitlePrincipal
Investigator
OrganisationDepartmentTotal Grant
Value (£)
A Calculus for Software Engineering of Mobile and Autonomous RobotsCavalcanti, Professor ALCUniversity of YorkComputer Science 1,766,824
A theory of type theoriesAhrens, Dr BUniversity of BirminghamSchool of Computer Science 261,609
Academic Centre of Excellence in Cyber Security Research - [Royal Holloway University of London]Markantonakis, Professor KRoyal Holloway, Univ of LondonInformation Security 78,117
Academic Centre of Excellence in Cyber Security Research - Cardiff UniversityBurnap, Professor PCardiff UniversityComputer Science 64,898
Academic Centre of Excellence in Cyber Security Research - De Montfort UniversityBoiten, Professor EADe Montfort UniversityComputer Technology 48,741
Academic Centre of Excellence in Cyber Security Research - Imperial College LondonLupu, Professor ECImperial College LondonInstitute for Security Science and Tech 81,930
Academic Centre of Excellence in Cyber Security Research - King's College LondonSuch, Dr JMKings College LondonInformatics 63,961
Academic Centre of Excellence in Cyber Security Research - Lancaster UniversityRace, Professor NLancaster UniversityComputing & Communications 81,803
Academic Centre of Excellence in Cyber Security Research - Newcastle UniversityGross, Dr TRNewcastle UniversitySch of Computing 81,936
Academic Centre of Excellence in Cyber Security Research - Queen's University BelfastO'Neill, Professor MQueen's University of BelfastSch of Electronics, Elec Eng & Comp Sci 81,965
Academic Centre of Excellence in Cyber Security Research - University College LondonDe Cristofaro, Dr EUCLComputer Science 81,904
Academic Centre of Excellence in Cyber Security Research - University of BirminghamRyan, Professor MUniversity of BirminghamSchool of Computer Science 81,162
Academic Centre of Excellence in Cyber Security Research - University of BristolPage, Dr DUniversity of BristolComputer Science 36,205
Academic Centre of Excellence in Cyber Security Research - University of CambridgeStajano, Dr FUniversity of CambridgeComputer Science and Technology 81,719
Academic Centre of Excellence in Cyber Security Research - University of EdinburghAspinall, Professor DUniversity of EdinburghSch of Informatics 81,715
Academic Centre of Excellence in Cyber Security Research - University of KentLi, Professor SUniversity of KentSch of Computing 64,602
Academic Centre of Excellence in Cyber Security Research - University of Northumbria at NewcastleCoventry, Professor LNorthumbria, University ofFac of Health and Life Sciences 48,574
Academic Centre of Excellence in Cyber Security Research - University of OxfordMartin, Professor AUniversity of OxfordComputer Science 81,931
Academic Centre of Excellence in Cyber Security Research - University of SouthamptonSassone, Professor VUniversity of SouthamptonSch of Electronics and Computer Sci 81,867
Academic Centre of Excellence in Cyber Security Research - University of SurreySchneider, Professor SAUniversity of SurreyComputing Science 81,966
Academic Centre of Excellence in Cyber Security Research - University of WarwickMaple, Professor CUniversity of WarwickWMG 81,965
AISEC: AI Secure and Explainable by ConstructionAtkey, Dr RAUniversity of StrathclydeComputer and Information Sciences 348,439
AISEC: AI Secure and Explainable by ConstructionKomendantskaya, Dr EHeriot-Watt UniversityS of Mathematical and Computer Sciences 807,165
AISEC: AI Secure and Explainable by ConstructionAspinall, Professor DUniversity of EdinburghSch of Informatics 670,675
Application Customisation: Enhancing Design Quality and Developer ProductivityLuk, Professor WImperial College LondonComputing 1,263,356
Automatically Detecting and Surviving Exploitable Compiler BugsCadar, Professor CImperial College LondonComputing 672,083
AutoPaSS: Automatic Verification of Complex Privacy Requirements in Unbounded-Size Secure SystemsBoureanu, Dr ICUniversity of SurreyComputing Science 303,951
Border Patrol: Improving Smart Device Security through Type-Aware Systems DesignVanderbauwhede, Professor WUniversity of GlasgowSchool of Computing Science 1,765,760
C6: Correct-by-Construction Heterogeneous CoherenceNagarajan, Dr VUniversity of EdinburghSch of Informatics 494,698
CaMELot: Catching and Mitigating Event-Loop Concurrency IssuesMarr, Dr SUniversity of KentSch of Computing 209,756
Capable VMsSinger, Dr JUniversity of GlasgowSchool of Computing Science 469,283
CapableVMsTratt, Professor LKings College LondonInformatics 837,189
CapC: Capability C semantics, tools and reasoningBatty, Dr MUniversity of KentSch of Computing 485,168
CAPS: Collaborative Architectures for Proof SearchReger, Dr GUniversity of Manchester, TheComputer Science 251,632
CITCoM: Casual Inference for Testing of Computational ModelsWalkinshaw, Dr NUniversity of SheffieldComputer Science 670,838
CloudCAP: Capability-based Isolation for Cloud Native ApplicationsPietzuch, Professor PRImperial College LondonComputing 879,242
CodeCPS: Correct-by-Design Estimation and Control of Cyber-Physical SystemsSoudjani, Dr SNewcastle UniversitySch of Computing 388,069
COSTRA -- The Cost of Winning StrategiesTotzke, Dr PUniversity of LiverpoolComputer Science 349,044
Cyber Security CDT Phase Two (University of Oxford)Martin, Professor AUniversity of OxfordComputer Science 3,551,360
CyPhyAssure: Compositional Safety Assurance for Cyber-Physical SystemsFoster, Dr SDUniversity of YorkComputer Science 562,549
DeepSecurity - Applying Deep Learning to Hardware SecurityO'Neill, Professor MQueen's University of BelfastSch of Electronics, Elec Eng & Comp Sci 765,827
Dijkstra's Pipe: Timing-Secure Processors by DesignNagarajan, Dr VUniversity of EdinburghSch of Informatics 535,239
EDGE - Adaptive Deep Learning Hardware for Embedded PlatformsZhai, Dr XUniversity of EssexComputer Sci and Electronic Engineering 232,166
Energise: Refactorings and Skeletons for Energy-Aware Applications on High-Performance Embedded SystemsBrown, Dr CMUniversity of St AndrewsComputer Science 382,865
EnnCore: End-to-End Conceptual Guarding of Neural ArchitecturesCordeiro, Dr LCUniversity of Manchester, TheComputer Science 1,721,560
EPSRC Centre for Doctoral Training in Autonomous Intelligent Machines and SystemsOsborne, Dr M AUniversity of OxfordEngineering Science 5,266,183
EPSRC Centre for Doctoral Training in Cyber Security for the EverydayMartin, Professor KRoyal Holloway, Univ of LondonInformation Security 5,964,769
EPSRC Centre for Doctoral Training in CybersecurityPym, Professor DUCLComputer Science 5,734,203
EPSRC Centre for Doctoral Training in High Performance Embedded and Distributed SystemsLuk, Professor WImperial College LondonComputing 4,099,016
EPSRC Centre for Doctoral Training in Pervasive ParallelismO'Boyle, Professor MUniversity of EdinburghSch of Informatics 3,937,632
EPSRC Centre for Doctoral Training in Trust, Identity, Privacy and Security in Large-scale Infrastructures (TIPS-at-Scale)Rashid, Professor AUniversity of BristolComputer Science 6,235,172
Feedback and Optimisation for Well-behaved Anonymous Communication NetworksElahi, Dr MUniversity of EdinburghSch of Informatics 232,700
Future AI and Robotics Hub for Space (FAIR-SPACE)Sweeting, Professor Sir MUniversity of SurreySurrey Space Centre Academic 8,537,361
Higher-order Constrained Horn Clauses: A New Approach to Verifying Higher-order ProgramsRamsay, Dr S JUniversity of BristolComputer Science 366,931
Higher-order Constrained Horn Clauses: A New Approach to Verifying Higher-order ProgramsOng, Professor CHLUniversity of OxfordComputer Science 409,019
Holistic Design of Secure Systems on Capability Hardware (HD-Sec)Butler, Professor MUniversity of SouthamptonSch of Electronics and Computer Sci 1,030,183
Interface reasoning for interacting systems (IRIS).Pym, Professor DUCLComputer Science 6,146,075
Learning, Approximating and Minimising Streaming Automata for Large-scale OptimisationDaviaud, Dr LCity, University of LondonSch of Engineering and Mathematical Sci 249,527
Mind the Gap: Unified Reasoning About Program Correctness and EfficiencyHutton, Professor GUniversity of NottinghamSchool of Computer Science 411,980
POST: Protocols, Observabilities and Session TypesYoshida, Professor NImperial College LondonComputing 1,462,802
QuTie: reasoning with Quantifiers and TheoriesVoronkov, Professor AUniversity of Manchester, TheComputer Science 359,372
Realistic fault modelling to enable optimization of low power IoT and Cognitive fault-tolerant computing systemsZhang, Professor JFLiverpool John Moores UniversitySchool of Engineering 487,200
Realistic fault modelling to enable optimization of low power IoT and Cognitive fault-tolerant computing systemsAsenov, Professor AUniversity of GlasgowSchool of Engineering 446,241
Research Institute in Verified Trustworthy Software Systems (VeTSS)Gardner, Professor PImperial College LondonComputing 654,850
RoboTest: : Systematic Model-Based Testing and Simulation of Mobile Autonomous RobotsCavalcanti, Professor ALCUniversity of YorkComputer Science 1,166,973
RoboTest: Systematic Model-Based Testing and Simulation of Mobile Autonomous RobotsHierons, Professor RUniversity of SheffieldComputer Science 575,877
Robotics & Autonomous Systems: EPSRC UK-RAS NetworkRodriguez y Baena, Professor FMImperial College LondonComputing 871,055
Science of Sensor System SoftwareCalder, Professor MUniversity of GlasgowSchool of Computing Science 4,183,694
SCorCH : Secure Code for Capability HardwareMelham, Professor TUniversity of OxfordComputer Science 312,916
SCorCH: Secure Code for Capability HardwareReger, Dr GUniversity of Manchester, TheComputer Science 1,034,990
Session Types for Reliable Distributed Systems (STARDUST)Gay, Professor SJUniversity of GlasgowSchool of Computing Science 563,806
Session Types for Reliable Distributed Systems (STARDUST)Yoshida, Professor NImperial College LondonComputing 697,651
Session Types for Reliable Distributed Systems (STARDUST)Bocchi, Dr LUniversity of KentSch of Computing 555,120
Solving Parity Games in Theory and PracticeJurdzinski, Dr MUniversity of WarwickComputer Science 347,959
Strategy Logics for the Verification of Security ProtocolsBelardinelli, Dr FImperial College LondonComputing 8,996
String Constraint Solving with Real-World Regular ExpressionsHague, Dr MRoyal Holloway, Univ of LondonComputer Science 393,618
Synthetic Portabolomics: Leading the way at the crossroads of the Digital and the Bio EconomiesKrasnogor, Professor NNewcastle UniversitySch of Computing 4,353,851
Turtles: Protocol-Based Foundations for Distributed Multiagent SystemsChopra, Dr ALancaster UniversityComputing & Communications 686,507
Turtles: Protocol-Based Foundations for Distributed Multiagent SystemsYoshida, Professor NImperial College LondonComputing 863,741
Twenty20InsightHe, Professor YUniversity of WarwickComputer Science 305,864
Twenty20InsightBencomo, Dr NAston UniversityCollege of Engineering and Physical Sci 586,520
UK Robotics and Artificial Intelligence Hub for Offshore Energy Asset Integrity ManagementPetillot, Professor YHeriot-Watt UniversitySch of Engineering and Physical Science 15,223,235
UKRI Centre for Doctoral Training in Safe and Trusted Artificial IntelligenceLuck, Professor MKings College LondonInformatics 6,865,984
UKRI Trustworthy Autonomous Systems Node in FunctionalityWindsor, Dr SUniversity of BristolAerospace Engineering 3,315,004
UKRI Trustworthy Autonomous Systems Node in SecuritySuri, Professor NLancaster UniversityComputing & Communications 3,011,796
UKRI Trustworthy Autonomous Systems Node in VerifiabilityMousavi, Professor MUniversity of LeicesterComputer Science 2,923,653
UniFaaS: A Unikernel-Based Serverless Operating SystemOlivier, Dr PUniversity of Manchester, TheComputer Science 267,264
User-controlled hardware security anchors: evaluation and designsRyan, Professor MUniversity of BirminghamSchool of Computer Science 486,082
Verifiably Correct Swarm AttestationDongol, Dr BUniversity of SurreyComputing Science 514,155
Verification of Hardware Concurrency via Model Learning (CLeVer)Silva, Professor AUCLComputer Science 692,958
VeTSpec: Verified Trustworthy Software SpecificationGardner, Professor PImperial College LondonComputing 1,579,794

Total Number of Grants: 91
Total Value of Grants: £126,453,584

The grant value may include the cost of access to facilities (these funds are not awarded to the grant holding organisation).