EPSRC logo
EPSRC Support by Socio-economic Theme in Safe and Secure ICT

EPSRC classifies the research it supports by socio-economic theme. This taxonomy has been used to classify all grants current on 1st January 2003 or received after this date.

Please note that the assignment of a theme to a grant indicates that the theme may apply in whole or in part to the research activity of that grant. This means that the values of grants within a classification should not be totalled to find the total investment in that area or to compare investment between areas of research. The value shown for each grant is always the total awarded, not the proportion attributed to the individual socio-economic theme.

Grant TitlePrincipal
Investigator
OrganisationDepartmentTotal Grant
Value (£)
A Framework for Risk-Informed Metrics-Enriched Cybersecurity Playbooks for CNI ResilienceCherdantseva, Dr YCardiff UniversityComputer Science 503,174
AISEC: AI Secure and Explainable by ConstructionKomendantskaya, Dr EHeriot-Watt UniversityS of Mathematical and Computer Sciences 807,165
AISEC: AI Secure and Explainable by ConstructionAtkey, Dr RAUniversity of StrathclydeComputer and Information Sciences 348,439
AISEC: AI Secure and Explainable by ConstructionAspinall, Professor DUniversity of EdinburghSch of Informatics 670,675
AppControl: Enforcing Application Behaviour through Type-Based ConstraintsVanderbauwhede, Professor WUniversity of GlasgowSchool of Computing Science 1,483,020
Automatically Detecting and Surviving Exploitable Compiler BugsCadar, Professor CImperial College LondonComputing 672,083
AutoPaSS: Automatic Verification of Complex Privacy Requirements in Unbounded-Size Secure SystemsBoureanu, Dr ICUniversity of SurreyComputing Science 303,951
Boosting power efficiency of physical-layer secured MIMO communicationsDing, Dr YHeriot-Watt UniversitySch of Engineering and Physical Science 251,815
Bridging the Gap Between Lattice Coding and Lattice Cryptography - Post-Quantum CryptographyLing, Dr CImperial College LondonElectrical and Electronic Engineering 436,303
Bridging the Gap Between Lattice Coding and Lattice Cryptography - Post-Quantum CryptographyAlbrecht, Professor MRoyal Holloway, Univ of LondonInformation Security 379,964
CaMELot: Catching and Mitigating Event-Loop Concurrency IssuesMarr, Dr SUniversity of KentSch of Computing 209,756
Capable VMsSinger, Dr JUniversity of GlasgowSchool of Computing Science 469,283
CapableVMsTratt, Professor LKings College LondonInformatics 837,189
CapC: Capability C semantics, tools and reasoningBatty, Dr MUniversity of KentSch of Computing 485,168
CAPcelerate: Capabilities for Heterogeneous AcceleratorsJones, Dr TMUniversity of CambridgeComputer Science and Technology 1,199,866
CAP-TEE: Capability Architectures for Trusted ExecutionOswald, Dr D FUniversity of BirminghamSchool of Computer Science 1,000,206
CHERI for Hypervisors and Operating Systems (CHaOS)Watson, Dr R N MUniversity of CambridgeComputer Science and Technology 875,939
Citizen ForensicsBandara, Professor AKOpen UniversityFaculty of Sci, Tech, Eng & Maths (STEM) 1,093,594
CloudCAP: Capability-based Isolation for Cloud Native ApplicationsPietzuch, Professor PRImperial College LondonComputing 879,242
CodeCPS: Correct-by-Design Estimation and Control of Cyber-Physical SystemsSoudjani, Dr SNewcastle UniversitySch of Computing 388,069
Combining Viewpoints in Quantum Theory (Ext.)Heunen, Dr CUniversity of EdinburghSch of Informatics 529,579
Cyber Security for the Vehicles of TomorrowGarcia, Professor FUniversity of BirminghamSchool of Computer Science 1,127,781
CyPhyAssure: Compositional Safety Assurance for Cyber-Physical SystemsFoster, Dr SDUniversity of YorkComputer Science 562,549
CyReSE: Cyber Security Research Software EngineeringCarlin, Dr DQueen's University of BelfastSch of Electronics, Elec Eng & Comp Sci 497,158
DADAMcAuley, Professor DUniversity of NottinghamHorizon Digital Economy Research 1,011,787
DeepSecurity - Applying Deep Learning to Hardware SecurityO'Neill, Professor MQueen's University of BelfastSch of Electronics, Elec Eng & Comp Sci 765,827
Dijkstra's Pipe: Timing-Secure Processors by DesignNagarajan, Dr VUniversity of EdinburghSch of Informatics 535,239
End to End Authentication of Caller ID in Heterogeneous Telephony SystemsHao, Professor FUniversity of WarwickComputer Science 901,040
EnnCore: End-to-End Conceptual Guarding of Neural ArchitecturesCordeiro, Dr LCUniversity of Manchester, TheComputer Science 1,721,560
EPSRC Centre for Doctoral Training in Cyber Security for the EverydayMartin, Professor KRoyal Holloway, Univ of LondonInformation Security 5,964,769
EPSRC Centre for Doctoral Training in CybersecurityPym, Professor DUCLComputer Science 5,734,203
EPSRC Centre for Doctoral Training in Modern Statistics and Statistical Machine LearningGandy, Professor AImperial College LondonMathematics 6,159,464
EPSRC Centre for Doctoral Training in Trust, Identity, Privacy and Security in Large-scale Infrastructures (TIPS-at-Scale)Rashid, Professor AUniversity of BristolComputer Science 6,235,172
Exploiting Defect Prediction for Automatic Software Repair (Fixie)Hall, Professor TLancaster UniversityComputing & Communications 367,238
Exploiting Defect Prediction for Automatic Software Repair (Fixie)Woodward, Dr J RQueen Mary University of LondonSch of Electronic Eng & Computer Science 242,011
Exploiting Defect Prediction for Automatic Software Repair (Fixie)Bowes, Dr DHLancaster UniversityComputing & Communications 238,074
HAMLET: Hardware Enabled Meta-Tracing (ext.)Tratt, Professor LKings College LondonInformatics 922,997
Higher-order Constrained Horn Clauses: A New Approach to Verifying Higher-order ProgramsOng, Professor CHLUniversity of OxfordComputer Science 409,019
Higher-order Constrained Horn Clauses: A New Approach to Verifying Higher-order ProgramsRamsay, Dr S JUniversity of BristolComputer Science 366,931
Holistic Design of Secure Systems on Capability Hardware (HD-Sec)Butler, Professor MUniversity of SouthamptonSch of Electronics and Computer Sci 1,030,183
Interface reasoning for interacting systems (IRIS).Pym, Professor DUCLComputer Science 6,146,075
Invariable generation in finite groups with applications to algorithmic number theoryTracey, Dr GUniversity of OxfordMathematical Institute 288,585
IOSEC - Protection and Memory Safety for Input/Output SecurityWatson, Dr R N MUniversity of CambridgeComputer Science and Technology 511,891
Isaac Newton Institute for Mathematical SciencesAbrahams, Professor IDUniversity of CambridgeIsaac Newton Institute (Math Science) 11,570,267
Isogeny-based cryptography: from theory to practicePetit, Dr CUniversity of BirminghamSchool of Computer Science 327,745
PETRAS 2Watson, Professor JDMUCLScience, Tech, Eng and Public Policy 13,850,000
POST: Protocols, Observabilities and Session TypesYoshida, Professor NImperial College LondonComputing 1,462,802
Post-Quantum Cryptography: a Cryptanalysis ApproachPetit, Dr CUniversity of BirminghamSchool of Computer Science 1,663,949
Programming as Conversation: Type-Driven Development in ActionBrady, Dr ECUniversity of St AndrewsComputer Science 367,276
REPHRAIN: Research centre on Privacy, Harm Reduction and Adversarial Influence onlineRashid, Professor AUniversity of BristolComputer Science 6,972,599
RE-PRESENT: Automatic Repair of Presentation Failures in Web ApplicationsMcMinn, Professor PSUniversity of SheffieldComputer Science 27,774
SAUSE: Secure, Adaptive, Usable Software EngineeringNuseibeh, Professor BOpen UniversityFaculty of Sci, Tech, Eng & Maths (STEM) 1,330,879
SCARV: a side-channel hardened RISC-V platformPage, Dr DUniversity of BristolComputer Science 1,024,324
SCOPE: Scoped Contextual Operations and Effects.Wu, Dr NImperial College LondonComputing 262,413
SCorCH : Secure Code for Capability HardwareMelham, Professor TUniversity of OxfordComputer Science 312,916
SCorCH: Secure Code for Capability HardwareReger, Dr GUniversity of Manchester, TheComputer Science 1,034,990
Security of Digital Twins in ManufacturingClark, Professor JAUniversity of SheffieldComputer Science 619,963
Serious Coding: A Game Approach To Security For The New Code-CitizensBaillie, Professor LHeriot-Watt UniversityS of Mathematical and Computer Sciences 998,239
Session Types for Reliable Distributed Systems (STARDUST)Yoshida, Professor NImperial College LondonComputing 697,651
Session Types for Reliable Distributed Systems (STARDUST)Bocchi, Dr LUniversity of KentSch of Computing 555,120
Session Types for Reliable Distributed Systems (STARDUST)Gay, Professor SJUniversity of GlasgowSchool of Computing Science 563,806
SIPP - Secure IoT Processor Platform with Remote AttestationO'Neill, Professor MQueen's University of BelfastSch of Electronics, Elec Eng & Comp Sci 1,294,888
String Constraint Solving with Real-World Regular ExpressionsHague, Dr MRoyal Holloway, Univ of LondonComputer Science 393,618
Taut foliations, representations, and the computational complexity of knot genusYazdi, Dr MUniversity of OxfordMathematical Institute 294,553
Turing AI Fellowship: Probabilistic Algorithms for Scalable and Computable Approaches to Learning (PASCAL)Nemeth, Dr CJLancaster UniversityMathematics and Statistics 1,097,295
UKRI Centre for Doctoral Training in Safe and Trusted Artificial IntelligenceLuck, Professor MKings College LondonInformatics 6,865,984
Untargeted Attacks in (Password-Based) CryptographyFarshim, Dr PUniversity of YorkComputer Science 265,225
User-controlled hardware security anchors: evaluation and designsRyan, Professor MUniversity of BirminghamSchool of Computer Science 486,082
Verifiably Correct Swarm AttestationDongol, Dr BUniversity of SurreyComputing Science 514,155
Verification of Hardware Concurrency via Model Learning (CLeVer)Silva, Professor AUCLComputer Science 692,958
VeTSpec: Verified Trustworthy Software SpecificationGardner, Professor PImperial College LondonComputing 1,579,794

Total Number of Grants: 71
Total Value of Grants: £112,691,296

The grant value may include the cost of access to facilities (these funds are not awarded to the grant holding organisation).