index - Grenoble Alpes Cybersecurity Institute Access content directly

The Grenoble Alpes Cybersecurity Institute aims at undertaking ground-breaking interdisciplinary research in order to address cybersecurity and privacy challenges. Our main technical focus is on low-cost secure elements, critical infrastructures, vulnerability analysis and validation of large systems, including practical resilience across the industry and the society. Our approach to cybersecurity is holistic, encompassing technical, legal, law-enforcement, economic, social, diplomatic, military and intelligence-related aspects with strong partnerships with the private sector and robust national and international cooperation with leading institutions in France and abroad.

 

Instructions to authors

Please don't forget  to mention the following in your articles:

"Ce travail a bénéficié d'une aide de l'Etat gérée par l'Agence Nationale de la Recherche au titre du programme "Investissements d'avenir" portant la référence ANR-15-IDEX-02"

or

"This work is supported by the French National Research Agency in the framework of the "Investissements d’avenir” program (ANR-15-IDEX-02)"

 

 

Last publications

 

 

 

Key words

ASCON Reliability Deobfuscation Security Code analysis ICS Countermeasures GDPR Encryption Multiple fault-injection Machine learning Malware Allan variance Fault attacks Opaque predicate BBICS Risk analysis Physically unclonable function PUF Architecture de défense Authenticated encryption with associated data Automated verification Deep learning IEEE 1687 Cybersécurité ANALYSE DES RISQUES Zero-knowledge proofs Clock glitching AEAD IT Hardware security EMFI Symbolic execution Anonymisation Asynchronous circuit FPGA Puzzle WooKey bootloader use-case PQC Behavioral based-IDS Approche Filtre Fault injection robustness evaluation Secure Access Fault injection X-Ray IoT Dynamic-symbolic execution Cybersecurity Asynchronous design Attacks Address randomization Artificial Neural Network Secure access BIST Masking Source code static analysis Attack-Tree analysis Authorization Automates programmables Asynchronous logic Risk assessment Card-based secure two-party protocols Reverse engineering Emulation AES low-cost hardware Approche par Filtres Asymmetric Cryptography Adaptive Attackers Automated Test Environments Fault detection Accès sécurisé Automated reasoning Fault model Safety Simulation Authentication Blockchain ADCs Access tokens Artificial Intelligence Ring oscillator RO Detection Diagnosis Microarchitecture Side-channel Biasing Micro-architecture Laser fault injection Aging Système de contrôle-commande industriel Hardware performance counters Obfuscation Fault injection attack Behavioral Model Security and privacy Automated test environment SCADA OT Industrial systems Privacy Mutual information