Approaches and tools for security in software and hardware development and assessment

Opened

Programme Category

EU Competitive Programmes

Programme Name

Horizon Europe (2021-2027)

Programme Description

Horizon Europe is the European Union (EU) funding programme for the period 2021 – 2027, which targets the sectors of research and innovation. The programme’s budget is around € 95.5 billion, of which € 5.4 billion is from NextGenerationEU to stimulate recovery and strengthen the EU’s resilience in the future, and € 4.5 billion is additional aid.

Programme Details

Identifier Code

HORIZON-CL3-2026-02-CS-ECCC-01

Call

Approaches and tools for security in software and hardware development and assessment

Summary

The increasing complexity and globalisation of software and hardware supply chains introduce new vulnerabilities that cyber adversaries can exploit. Ensuring the security of both software and hardware components across the lifecycle of digital systems is paramount. This topic aims to develop innovative tools, methods, and processes to secure the entire ecosystem of software and hardware development.

Detailed Call Description

Proposals should explicitly select one main area of focus but can also address both:

a. Secured hardware systems over trusted Chips

The security of modern computing infrastructures relies heavily on the robustness of hardware components. This subtopic aims to develop robust security solutions for trusted hardware platforms, focusing on secured microprocessors, secure boot mechanisms, and cryptographic acceleration. Proposals are also expected to address the risks of hardware-based vulnerabilities and backdoors, ensuring the security of devices from edge to cloud, also taking into account emerging threats, including quantum where relevant. Synergies with existing EU initiatives on trusted hardware (e.g., CHIPS JU, EuroHPC) are encouraged. The topic is expected to:

  • Develop new architectures for tamper-resistant chips and processors. Exploring novel designs for secure microprocessors, leveraging hardware-level security enhancements, and integrating cryptographic co-processors that may also support post-quantum cryptography (PQC), for enhanced protection against tampering and side-channel attacks.
  • Enhance supply chain transparency for chip production and integration. Exploring innovative ways to improve traceability and accountability in chip manufacturing processes, including methods such as post-quantum secure hardware roots of trust, blockchain for tracking components, or certification mechanisms.
  • Establish security-by-design methodologies for hardware security assessment. Advancing methodologies for systematic security testing of hardware components, including automated vulnerability analysis, verification frameworks, and integration of security assessment into chip design and lifecycle management.
  • Develop methods and tools for an effective and efficient non-destructive authentication and physical analysis of integrated circuits and multi-chips modules (chiplets).
  • Develop technical means for ensuring hardware supply chain security, and secure PQC implementations: hardware trojan and backdoor detection, hardware watermarking, relevant reverse engineering techniques, countermeasures also against new classes of hardware physical attacks. Develop self-healing firmware able to recover from cyber-attacks. Develop firmware able to leverage advanced anomaly detection, AI-driven threat mitigation and secure rollback mechanisms to automatically identify cyber-attacks, isolate compromised components restore the system to a trusted state while maintaining operational continuity.

b. Software Supply Chain security

The integrity of software supply chains is critical to mitigating cybersecurity threats such as supply chain attacks, dependency vulnerabilities, and compromised software components. This subtopic focuses on mitigating security risks in software supply chains, including secure code provenance, automated vulnerability detection, and secure software development lifecycle (SDLC) methodologies and tools, including those related to PQC security. Proposals should integrate formal verification approaches or AI-assisted security testing, leveraging upcoming European and International standards for supply chain security. The topic is expected to:

  • Develop innovative tools for real-time software vulnerability detection and automatic patching. Advancing the state of automated detection techniques, incorporating dynamic analysis, AI-driven pattern recognition, predictive analytics to proactively identify security weaknesses before exploitation and self-healing mechanisms.
  • Enhance secure software frameworks, including protection against the quantum threat. Exploring new methodologies for integrating security-by-design principles across development workflows, incorporating approaches such as automated security policy enforcement, modular security components, and improved dependency management.
  • Improve resilience against supply chain cyber threats. Investigating novel mitigation strategies, including provenance tracking for software components and their analysis, secure update distribution mechanisms including protection from emerging quantum threats where relevant, enhanced anomaly detection, and multi-layer defence approaches to ensure integrity and trustworthiness.

Call Total Budget

€20.000.000

Financing percentage by EU or other bodies / Level of Subsidy or Loan

100%

Expected EU contribution per project: between €3.00 and €4.00 million

Thematic Categories

  • Information and Communication Technologies
  • Information Technology
  • Research, Technological Development and Innovation

Eligibility for Participation

  • Businesses
  • Educational Institutions
  • Large Enterprises
  • Legal Entities
  • Researchers/Research Centers/Institutions
  • Small and Medium Enterprises (SMEs)

Eligibility For Participation Notes

In order to achieve the expected outcomes, and safeguard the Union’s strategic assets, interests, autonomy, and security, participation in this topic is limited to legal entities established in Member States and Associated Countries. In order to guarantee the protection of the strategic interests of the Union and its Member States, entities established in an eligible country listed above, but which are directly or indirectly controlled by a non-eligible country or by a non-eligible country entity, shall not participate in the action.

A number of non-EU/non-Associated Countries that are not automatically eligible for funding have made specific provisions for making funding available for their participants in Horizon Europe projects.

Call Opening Date

03/03/2026

Call Closing Date

15/09/2026

National Contact Point(s)

National Cybersecurity Coordination Centre Cyprus (NCC-CY)

1 Andrea Chaliou, 1075 Engomi, Nicosia,
Telephone: 1447
Fax: +357 22693070
Email: info@ncc.cy
Websitehttps://ncc.cy/en/

EU Contact Point