Skip to Main content Skip to Navigation

The Grenoble Alpes Cybersecurity Institute aims at undertaking ground-breaking interdisciplinary research in order to address cybersecurity and privacy challenges. Our main technical focus is on low-cost secure elements, critical infrastructures, vulnerability analysis and validation of large systems, including practical resilience across the industry and the society. Our approach to cybersecurity is holistic, encompassing technical, legal, law-enforcement, economic, social, diplomatic, military and intelligence-related aspects with strong partnerships with the private sector and robust national and international cooperation with leading institutions in France and abroad.

 

Instructions to authors

Please don't forget  to mention the following in your articles:

"Ce travail a bénéficié d'une aide de l'Etat gérée par l'Agence Nationale de la Recherche au titre du programme "Investissements d'avenir" portant la référence ANR-15-IDEX-02"

or

"This work is supported by the French National Research Agency in the framework of the "Investissements d’avenir” program (ANR-15-IDEX-02)"

 

 

Last publications

 

 

 

Key words

Combinational constraints Authorization Control and security for critical infrastructure systems EM Détection Privacy Access tokens Attack-Tree analysis CMOS Bulk Diagnostic Execute In Place Card-based secure two-party protocols Puzzle Distance Group key distribution Automated verification Critical state distance Differential Fault Analysis Zero-knowledge proofs Code cloning FD-SOI Architecture de défense Computer-aided design Opaque predicate Machine learning Obfuscation Fault injection Cryptocurrency Communication security Control-flow graph Digitalization Cyberspace Critical states distance BBICS Formal verification Behavioral based-IDS Cyberattacks Filtre Cyber-security Data protection Cybersécurité des systèmes industriels FDSOI Conspiracy Santa DES Discrete Event System Functional safety Finger- prints Approche par Filtres Due diligence Symbolic execution Discrete event system AES low-cost hardware Cyber Security Système de contrôle-commande industriel Asynchronous circuit Diagnosis Distance aux états critiques Cybersécurité Compilation Cyber Sécurité Reverse engineering Fault detection Approche Filtre CYBERSÉCURITÉ Flow integrity Cyber security Counterfeit Concurrency Discrete event systems Automates programmables Asynchronous logic Cybersecurity Bow-Tie analysis Ensemble learning GDPR CMOS bulk Countermeasures Behavioral Model Asynchronous design Filter Approach Clocks Blockchain Cyber DFA Deobfuscation Authentication Cyber Attacks CADP SCADA First-order logic Laser fault injection Authenticated encryption with associated data Cyber Physical Systems Cyber Attaque Automated reasoning Filter approach ANALYSE DES RISQUES Industrial systems Cyber-attacks AEAD