index - Grenoble Alpes Cybersecurity Institute Access content directly

The Grenoble Alpes Cybersecurity Institute aims at undertaking ground-breaking interdisciplinary research in order to address cybersecurity and privacy challenges. Our main technical focus is on low-cost secure elements, critical infrastructures, vulnerability analysis and validation of large systems, including practical resilience across the industry and the society. Our approach to cybersecurity is holistic, encompassing technical, legal, law-enforcement, economic, social, diplomatic, military and intelligence-related aspects with strong partnerships with the private sector and robust national and international cooperation with leading institutions in France and abroad.

 Instructions to authors

Please don't forget  to mention the following in your articles:

"Ce travail a bénéficié d'une aide de l'Etat gérée par l'Agence Nationale de la Recherche au titre du programme "Investissements d'avenir" portant la référence ANR-15-IDEX-02"


"This work is supported by the French National Research Agency in the framework of the "Investissements d’avenir” program (ANR-15-IDEX-02)"


Last publications




Key words

Address randomization Opaque predicate Micro-architecture Reliability Microarchitecture Secure access Ring oscillator RO Zero-knowledge proofs Allan variance Malware Adversarial examples Adversarial perturbation Hardware security IT Automated test environment Access tokens Deobfuscation Dynamic-symbolic execution Mutual information Privacy FPGA PQC Fault detection Detection Attack-Tree analysis Fault model Artificial Neural Network ICS Automated Test Environments Fault injection Code analysis ADCs Simulation Approche par Filtres Risk assessment Side-channel attacks Fault injection robustness evaluation Accès sécurisé Authentication Approche Filtre Masking Card-based secure two-party protocols Source code static analysis Encryption AES low-cost hardware Deep learning Asynchronous logic Laser Fault Injection Security and privacy IEEE 1687 Asynchronous design Asynchronous circuit Physically unclonable function PUF ANALYSE DES RISQUES Artificial neural network ANN Security Risk analysis Multi-Fault Attack AEAD Adaptive Attackers IoT Anonymisation Industrial systems Fault attacks Hardware performance counters Safety Authorization SCADA Aging Reverse engineering Clock glitching Artificial Intelligence OT X-Ray Puzzle Machine learning Fault injection attack Obfuscation EMFI Side-channel Attacks WooKey bootloader use-case Hardware ASCON Emulation GDPR Asymmetric Cryptography Fault Injection Simulation Countermeasures Secure Access Diagnosis Architecture de défense Cybersecurity Encoding Cybersécurité Symbolic execution Multiple fault-injection Formal methods Microcontroller Système de contrôle-commande industriel