index - Grenoble Alpes Cybersecurity Institute Access content directly

The Grenoble Alpes Cybersecurity Institute aims at undertaking ground-breaking interdisciplinary research in order to address cybersecurity and privacy challenges. Our main technical focus is on low-cost secure elements, critical infrastructures, vulnerability analysis and validation of large systems, including practical resilience across the industry and the society. Our approach to cybersecurity is holistic, encompassing technical, legal, law-enforcement, economic, social, diplomatic, military and intelligence-related aspects with strong partnerships with the private sector and robust national and international cooperation with leading institutions in France and abroad.

 

Instructions to authors

Please don't forget  to mention the following in your articles:

"Ce travail a bénéficié d'une aide de l'Etat gérée par l'Agence Nationale de la Recherche au titre du programme "Investissements d'avenir" portant la référence ANR-15-IDEX-02"

or

"This work is supported by the French National Research Agency in the framework of the "Investissements d’avenir” program (ANR-15-IDEX-02)"

 

 

Last publications

 

 

 

Key words

AEAD Industrial systems WooKey bootloader use-case Hardware security Risk assessment Behavioral based-IDS Artificial Neural Network BIST Obfuscation Asynchronous circuit Risk analysis Attack-Tree analysis Zero-knowledge proofs Blockchain ASCON Asymmetric Cryptography Laser fault injection Cybersécurité Physically unclonable function PUF Detection Simulation Opaque predicate Side-channel Deobfuscation Approche par Filtres Authorization Attacks Hardware performance counters ADCs GDPR IoT Mutual information EMFI Automated test environment Authenticated encryption with associated data Microarchitecture Allan variance Symbolic execution Masking Clock glitching Emulation Behavioral Model Malware ANALYSE DES RISQUES Reverse engineering SCADA Artificial Intelligence Système de contrôle-commande industriel Adaptive Attackers IT Security and privacy Deep learning Fault attacks Asynchronous logic Source code static analysis Accès sécurisé PQC Safety Asynchronous design Diagnosis Architecture de défense Automates programmables Privacy Reliability AES low-cost hardware Address randomization Automated verification IEEE 1687 Puzzle Card-based secure two-party protocols Anonymisation Countermeasures Micro-architecture Secure Access Automated Test Environments Fault injection attack Multiple fault-injection Cybersecurity Secure access Aging Ring oscillator RO Machine learning Authentication Fault model BBICS Fault injection Security Fault injection robustness evaluation ICS Code analysis X-Ray Automated reasoning OT Dynamic-symbolic execution Biasing Approche Filtre Access tokens Encryption FPGA Fault detection