index - Grenoble Alpes Cybersecurity Institute Access content directly

The Grenoble Alpes Cybersecurity Institute aims at undertaking ground-breaking interdisciplinary research in order to address cybersecurity and privacy challenges. Our main technical focus is on low-cost secure elements, critical infrastructures, vulnerability analysis and validation of large systems, including practical resilience across the industry and the society. Our approach to cybersecurity is holistic, encompassing technical, legal, law-enforcement, economic, social, diplomatic, military and intelligence-related aspects with strong partnerships with the private sector and robust national and international cooperation with leading institutions in France and abroad.

 Instructions to authors

Please don't forget  to mention the following in your articles:

"Ce travail a bénéficié d'une aide de l'Etat gérée par l'Agence Nationale de la Recherche au titre du programme "Investissements d'avenir" portant la référence ANR-15-IDEX-02"

or

"This work is supported by the French National Research Agency in the framework of the "Investissements d’avenir” program (ANR-15-IDEX-02)"

 

Last publications

 

 

 

Key words

Zero-knowledge proofs Adaptive Attackers Formal methods Authorization Emulation Fault attacks Asynchronous design Artificial Intelligence Source code static analysis Cybersécurité Cybersecurity Deep learning Artificial Neural Network Adversarial perturbation Aging Puzzle IoT ICS AES low-cost hardware Secure Access Industrial systems Fault model EMFI Système de contrôle-commande industriel Micro-architecture X-Ray Clock glitching Dynamic-symbolic execution Attacks Adversarial examples Architecture de défense Obfuscation Microcontroller Masking GDPR Fault injection robustness evaluation Reverse engineering Hardware security Side-channel attacks IEEE 1687 Anonymisation Symbolic execution Fault detection Microarchitecture Fault Injection Simulation Attack-Tree analysis FPGA PQC Fault injection attack ANALYSE DES RISQUES Security Access tokens Artificial neural network ANN Risk analysis Authentication Diagnosis Opaque predicate Hardware performance counters IT Detection Mutual information Safety Card-based secure two-party protocols Hardware Reliability Fault injection ADCs Risk assessment WooKey bootloader use-case Automated Test Environments Approche par Filtres ASCON Address randomization SCADA Encoding Code analysis Encryption Laser Fault Injection Countermeasures Accès sécurisé Simulation Multi-Fault Attack Deobfuscation Automated test environment Asymmetric Cryptography OT Asynchronous logic Side-channel AEAD Ring oscillator RO Security and privacy Multiple fault-injection Approche Filtre Physically unclonable function PUF Asynchronous circuit Secure access Malware Privacy Machine learning Allan variance