AlmaCrypt (largest grant, EUR 1M), OSARES (reactive synthesis), and SYSTEMATICGRAPH (graph problem complexity) form a sustained theoretical core.
CISPA - HELMHOLTZ-ZENTRUM FUR INFORMATIONSSICHERHEIT GGMBH
Helmholtz information security center combining algorithmic cryptology, fault-tolerant hardware design, and applied cybersecurity testing across 8 H2020 projects.
Their core work
CISPA is a Helmholtz Center dedicated to information security research, operating at the intersection of theoretical computer science and practical cybersecurity. They develop foundational algorithms for cryptology and graph complexity, design reliable hardware resistant to fault conditions, and build tools for web application security and privacy testing. Their work spans from mathematical foundations (algorithmic cryptology, reactive synthesis) to applied threat intelligence (malware analysis, botnet tracking) and hardware reliability under real-world conditions like voltage droops and metastability.
What they specialise in
ToRH developed theory for Byzantine fault-tolerance and FPGA prototyping; FastVolt addressed voltage droop compensation with metastability containment.
SISSDEN built sensor networks with honeypots and darknets for threat feeds; RAMSES focused on malware forensics targeting ransomware and banking trojans.
TESTABLE (2021-2024, EUR 721K) applies security testing patterns combining static analysis, dynamic analysis, and privacy assessment for web applications.
ToRH addressed clock synchronization, routing, and consensus under Byzantine fault conditions — relevant to distributed systems and blockchain infrastructure.
How they've shifted over time
CISPA's early H2020 work (2016-2019) combined deep theoretical computer science (cryptology, algorithmic complexity) with hands-on cyber threat intelligence — tracking botnets, analyzing malware, and operating honeypots and darknets through SISSDEN and RAMSES. From 2019 onward, the applied security work shifted from network-level threat hunting toward hardware reliability (fault-tolerance, FPGA prototyping, voltage droop compensation) and software-level security testing (web application testing, privacy analysis). The theoretical foundations remained constant, but the applied layer moved decidedly from reactive threat monitoring to proactive security engineering at both hardware and software levels.
CISPA is moving from observing threats (botnets, malware) toward engineering security into systems from the ground up — at the hardware, software, and algorithmic levels — making them a strong partner for security-by-design initiatives.
How they like to work
CISPA overwhelmingly leads its own projects — 6 of 8 projects as coordinator, with the remaining 2 as third-party contributor. This signals a research group that sets its own agenda through ERC grants rather than joining large industry-driven consortia. With 35 unique partners across 12 countries, they maintain a broad but not deep network, typical of an organization that brings specialized expertise to different collaborations rather than building long-term consortium blocs.
CISPA has worked with 35 distinct partners across 12 countries, reflecting wide European reach. Their network is spread broadly rather than concentrated in a few repeat partnerships, consistent with their role as an ERC-funded research leader that attracts different collaborators per topic.
What sets them apart
CISPA stands out by combining deep theoretical computer science — algorithmic complexity, cryptology, formal synthesis — with direct application to real-world security problems in hardware and software. Very few organizations can credibly work on both mathematical proofs about graph complexity AND practical FPGA fault-tolerance or web application vulnerability testing. As a Helmholtz Center, they carry institutional weight and long-term research continuity that university labs or SMEs typically cannot match, making them a reliable anchor partner for security-focused consortia.
Highlights from their portfolio
- AlmaCryptLargest single grant (EUR 1M ERC Consolidator) in algorithmic cryptology — signals deep, internationally recognized expertise in this foundational field.
- TESTABLEMost recent and commercially relevant project (2021-2024), bridging academic security research with practical web application testing and privacy compliance.
- ToRHUnusual combination of theoretical computer science (Byzantine fault-tolerance, self-stabilization) with hands-on hardware prototyping (FPGA, clock synchronization) — rare for a single research group.