index - Grenoble Alpes Cybersecurity Institute Access content directly

The Grenoble Alpes Cybersecurity Institute aims at undertaking ground-breaking interdisciplinary research in order to address cybersecurity and privacy challenges. Our main technical focus is on low-cost secure elements, critical infrastructures, vulnerability analysis and validation of large systems, including practical resilience across the industry and the society. Our approach to cybersecurity is holistic, encompassing technical, legal, law-enforcement, economic, social, diplomatic, military and intelligence-related aspects with strong partnerships with the private sector and robust national and international cooperation with leading institutions in France and abroad.

 

Instructions to authors

Please don't forget  to mention the following in your articles:

"Ce travail a bénéficié d'une aide de l'Etat gérée par l'Agence Nationale de la Recherche au titre du programme "Investissements d'avenir" portant la référence ANR-15-IDEX-02"

or

"This work is supported by the French National Research Agency in the framework of the "Investissements d’avenir” program (ANR-15-IDEX-02)"

 

 

Last publications

 

 

 

Key words

Behavioral Model SCADA Masking Authentication Code analysis AES low-cost hardware Architecture de défense X-Ray Adaptive Attackers Blockchain Malware Approche Filtre Secure Access Asynchronous design Asynchronous circuit IoT Symbolic execution Privacy Attack-Tree analysis Clock glitching Side-channel Automated verification ADCs Microarchitecture Card-based secure two-party protocols Security and privacy Laser fault injection Dynamic-symbolic execution Physically unclonable function PUF Secure access Security Machine learning Micro-architecture Attacks Hardware security Automated Test Environments AEAD Ring oscillator RO Opaque predicate BIST Fault detection IEEE 1687 Multiple fault-injection Encryption Deep learning IT Approche par Filtres Source code static analysis Safety Cybersécurité Fault injection robustness evaluation Asymmetric Cryptography Biasing ANALYSE DES RISQUES Access tokens Risk analysis Industrial systems Système de contrôle-commande industriel Artificial Neural Network EMFI Simulation Fault attacks Allan variance Obfuscation Automated test environment Behavioral based-IDS ASCON Authenticated encryption with associated data Mutual information Zero-knowledge proofs Fault injection Diagnosis Automates programmables Cybersecurity Aging Artificial Intelligence Puzzle FPGA Asynchronous logic Risk assessment OT Address randomization ICS Deobfuscation Fault model PQC Automated reasoning Reverse engineering GDPR Reliability BBICS Anonymisation Authorization Emulation Detection WooKey bootloader use-case Countermeasures Fault injection attack Accès sécurisé Hardware performance counters