index - Grenoble Alpes Cybersecurity Institute Access content directly

The Grenoble Alpes Cybersecurity Institute aims at undertaking ground-breaking interdisciplinary research in order to address cybersecurity and privacy challenges. Our main technical focus is on low-cost secure elements, critical infrastructures, vulnerability analysis and validation of large systems, including practical resilience across the industry and the society. Our approach to cybersecurity is holistic, encompassing technical, legal, law-enforcement, economic, social, diplomatic, military and intelligence-related aspects with strong partnerships with the private sector and robust national and international cooperation with leading institutions in France and abroad.

 

Instructions to authors

Please don't forget  to mention the following in your articles:

"Ce travail a bénéficié d'une aide de l'Etat gérée par l'Agence Nationale de la Recherche au titre du programme "Investissements d'avenir" portant la référence ANR-15-IDEX-02"

or

"This work is supported by the French National Research Agency in the framework of the "Investissements d’avenir” program (ANR-15-IDEX-02)"

 

 

Last publications

 

 

 

Key words

Artificial Intelligence Asynchronous logic Formal methods Secure access Encoding Attacks Privacy Risk analysis Fault injection robustness evaluation PQC Emulation Clock glitching Système de contrôle-commande industriel Authorization FPGA Automated test environment EMFI Code analysis Hardware performance counters Deep learning Mutual information Ring oscillator RO IEEE 1687 Artificial Neural Network Simulation GDPR Encryption Address randomization Fault injection attack Fault injection ICS Malware Source code static analysis AEAD Physically unclonable function PUF Cybersecurity Microarchitecture Dynamic-symbolic execution Side-channel attacks ADCs Reverse engineering Opaque predicate Security Symbolic execution Security and privacy Side-channel Accès sécurisé Machine learning Asynchronous circuit Risk assessment Authentication Detection WooKey bootloader use-case Cybersécurité Micro-architecture Puzzle Fault model SCADA Allan variance Industrial systems Aging Artificial neural network ANN ASCON Approche Filtre Diagnosis Masking Adversarial examples Architecture de défense Zero-knowledge proofs Obfuscation Reliability IT Hardware AES low-cost hardware Multiple fault-injection X-Ray Safety ANALYSE DES RISQUES Approche par Filtres Hardware security IoT Access tokens Laser Fault Injection Deobfuscation Secure Access Anonymisation Adaptive Attackers Automated Test Environments Fault detection Attack-Tree analysis Adversarial perturbation Microcontroller Fault attacks Asynchronous design Fault Injection Simulation OT Countermeasures Card-based secure two-party protocols Asymmetric Cryptography Multi-Fault Attack