index - Grenoble Alpes Cybersecurity Institute Access content directly

The Grenoble Alpes Cybersecurity Institute aims at undertaking ground-breaking interdisciplinary research in order to address cybersecurity and privacy challenges. Our main technical focus is on low-cost secure elements, critical infrastructures, vulnerability analysis and validation of large systems, including practical resilience across the industry and the society. Our approach to cybersecurity is holistic, encompassing technical, legal, law-enforcement, economic, social, diplomatic, military and intelligence-related aspects with strong partnerships with the private sector and robust national and international cooperation with leading institutions in France and abroad.

 

Instructions to authors

Please don't forget  to mention the following in your articles:

"Ce travail a bénéficié d'une aide de l'Etat gérée par l'Agence Nationale de la Recherche au titre du programme "Investissements d'avenir" portant la référence ANR-15-IDEX-02"

or

"This work is supported by the French National Research Agency in the framework of the "Investissements d’avenir” program (ANR-15-IDEX-02)"

 

 

Last publications

 

 

 

Key words

Asynchronous design AEAD IEEE 1687 Code analysis Privacy Deep learning Simulation Approche par Filtres Approche Filtre Système de contrôle-commande industriel Puzzle Diagnosis OT Cybersécurité Microcontroller ANALYSE DES RISQUES ICS SCADA Source code static analysis Attack-Tree analysis Attacks IT Physically unclonable function PUF Micro-architecture Obfuscation Reliability Access tokens Ring oscillator RO Accès sécurisé Encryption Opaque predicate Laser Fault Injection Secure access Fault Injection Simulation Cybersecurity Countermeasures GDPR Fault injection robustness evaluation Side-channel Adversarial examples Formal methods Hardware security Side-channel attacks Fault injection attack Adversarial perturbation Machine learning Deobfuscation Asymmetric Cryptography Dynamic-symbolic execution Authorization Fault attacks Anonymisation Adaptive Attackers Artificial Neural Network Secure Access Masking Detection Symbolic execution Artificial Intelligence Risk assessment Security and privacy IoT Risk analysis Malware Emulation AES low-cost hardware Architecture de défense Fault detection Safety Fault injection Reverse engineering Automated Test Environments Automated test environment Allan variance EMFI Aging PQC FPGA Microarchitecture Fault model Hardware Address randomization Encoding Zero-knowledge proofs Hardware performance counters Multi-Fault Attack Asynchronous circuit Security Clock glitching ADCs Authentication Mutual information ASCON WooKey bootloader use-case Asynchronous logic Multiple fault-injection Artificial neural network ANN Industrial systems X-Ray Card-based secure two-party protocols