Project description
Smarter tools for safer tech
Cybersecurity regulations are tightening, and the complex demands of the Cybersecurity Act and Cyber Resilience Act present significant challenges for both tech developers and regulators. With this in mind, the EU-funded CCAT project will enhance four academic open-source tools to support continuous security checks and regulatory compliance. These include TLS-Scanner for TLS security, SCRUTINY for cryptographic evaluation, ALVIE for testing embedded systems, and sec-certs for analysing certification landscapes. By adapting these tools for real-world use and aligning them with EU rules, CCAT aims to increase trust and resilience in the digital single market. The aim is also to empower producers, consumers, and regulators to better understand, assess, and improve cybersecurity.
Objective
Cybersecurity regulations are becoming increasingly complex. The Cybersecurity Act (CSA) introduces an EU-wide cybersecurity certification framework, while the Cyber Resilience Act (CRA) sets mandatory cybersecurity requirements for products with digital components. A reliable and flexible set of tools is essential for continuous security assessment and navigating these evolving regulations.
In the CCAT project, we propose adapting four open-source tools, developed in academic cybersecurity research, to support the implementation of new regulations: (1) TLS-Scanner for assessing security in TLS clients and servers; (2) SCRUTINY for evaluating cryptographic implementations, software libraries, and hardware, including black-box setups; (3) ALVIE for testing embedded security architectures against vulnerabilities; (4) sec-certs for analysing certification landscapes and evaluating the relationships between certified products and actual vulnerabilities.
CCAT will enhance these tools to meet the needs of various users involved in or dependent on cybersecurity assessment and certification. The CCAT methodology builds upon: (1) Relevant feedback for purpose-driven enhancements enabled by collaboration with users applying the CCAT tools in diverse application scenarios. (2) Robust usable security research exploring and collaboratively improving user interaction with the tools. (3) Aligning the tools with the emerging EU security certification landscape.
CCAT tools aim to empower both ICT producers and consumers, fostering a more transparent, accountable, and resilient digital environment. Regulatory bodies can use these tools to assess the effectiveness of cybersecurity certifications, verify the security of specific implementations, and ensure the EU digital single market cybersecurity.
Fields of science (EuroSciVoc)
CORDIS classifies projects with EuroSciVoc, a multilingual taxonomy of fields of science, through a semi-automatic process based on NLP techniques. See: The European Science Vocabulary.
CORDIS classifies projects with EuroSciVoc, a multilingual taxonomy of fields of science, through a semi-automatic process based on NLP techniques. See: The European Science Vocabulary.
- natural sciences computer and information sciences software
- natural sciences computer and information sciences computer security
You need to log in or register to use this function
We are sorry... an unexpected error occurred during execution.
You need to be authenticated. Your session might have expired.
Thank you for your feedback. You will soon receive an email to confirm the submission. If you have selected to be notified about the reporting status, you will also be contacted when the reporting status will change.
Keywords
Project’s keywords as indicated by the project coordinator. Not to be confused with the EuroSciVoc taxonomy (Fields of science)
Project’s keywords as indicated by the project coordinator. Not to be confused with the EuroSciVoc taxonomy (Fields of science)
Programme(s)
Multi-annual funding programmes that define the EU’s priorities for research and innovation.
Multi-annual funding programmes that define the EU’s priorities for research and innovation.
-
HORIZON.2.3 - Civil Security for Society
MAIN PROGRAMME
See all projects funded under this programme -
HORIZON.2.3.3 - Cybersecurity
See all projects funded under this programme
Topic(s)
Calls for proposals are divided into topics. A topic defines a specific subject or area for which applicants can submit proposals. The description of a topic comprises its specific scope and the expected impact of the funded project.
Calls for proposals are divided into topics. A topic defines a specific subject or area for which applicants can submit proposals. The description of a topic comprises its specific scope and the expected impact of the funded project.
Funding Scheme
Funding scheme (or “Type of Action”) inside a programme with common features. It specifies: the scope of what is funded; the reimbursement rate; specific evaluation criteria to qualify for funding; and the use of simplified forms of costs like lump sums.
Funding scheme (or “Type of Action”) inside a programme with common features. It specifies: the scope of what is funded; the reimbursement rate; specific evaluation criteria to qualify for funding; and the use of simplified forms of costs like lump sums.
HORIZON-IA - HORIZON Innovation Actions
See all projects funded under this funding scheme
Call for proposal
Procedure for inviting applicants to submit project proposals, with the aim of receiving EU funding.
Procedure for inviting applicants to submit project proposals, with the aim of receiving EU funding.
(opens in new window) HORIZON-CL3-2024-CS-01
See all projects funded under this callCoordinator
Net EU financial contribution. The sum of money that the participant receives, deducted by the EU contribution to its linked third party. It considers the distribution of the EU financial contribution between direct beneficiaries of the project and other types of participants, like third-party participants.
601 77 Brno
Czechia
The total costs incurred by this organisation to participate in the project, including direct and indirect costs. This amount is a subset of the overall project budget.