Skip to Main content Skip to Navigation

The Grenoble Alpes Cybersecurity Institute aims at undertaking ground-breaking interdisciplinary research in order to address cybersecurity and privacy challenges. Our main technical focus is on low-cost secure elements, critical infrastructures, vulnerability analysis and validation of large systems, including practical resilience across the industry and the society. Our approach to cybersecurity is holistic, encompassing technical, legal, law-enforcement, economic, social, diplomatic, military and intelligence-related aspects with strong partnerships with the private sector and robust national and international cooperation with leading institutions in France and abroad.

 

Instructions to authors

Please don't forget  to mention the following in your articles:

"Ce travail a bénéficié d'une aide de l'Etat gérée par l'Agence Nationale de la Recherche au titre du programme "Investissements d'avenir" portant la référence ANR-15-IDEX-02"

or

"This work is supported by the French National Research Agency in the framework of the "Investissements d’avenir” program (ANR-15-IDEX-02)"

 

 

Last publications

 

 

 

Key words

Differential Fault Analysis Système de contrôle-commande industriel Obfuscation Cyber security Zero-knowledge proofs Digitalization Computer-aided design Combinational constraints Cyber Attaque Cyber Cyber-security Filter approach Reverse engineering Counterfeit Discrete event systems Authorization CADP Automated reasoning Cybersécurité des systèmes industriels AES low-cost hardware Automated verification First-order logic Execute In Place Détection Industrial systems Privacy CMOS Bulk Cyber Sécurité Cybersecurity Fault detection Machine learning Opaque predicate Symbolic execution AEAD Flow integrity Blockchain BBICS Puzzle Asynchronous circuit DFA EM Ensemble learning Cryptocurrency Behavioral based-IDS CYBERSÉCURITÉ Behavioral Model Card-based secure two-party protocols Compilation DES Countermeasures GDPR Filtre Control and security for critical infrastructure systems Data protection Distance Discrete Event System CMOS bulk Cyber Physical Systems Functional safety Clocks ANALYSE DES RISQUES Access tokens Discrete event system Finger- prints Critical states distance Cyberspace Authentication Cyber Attacks Attack-Tree analysis Code cloning Concurrency Cybersécurité FD-SOI Cyber-attacks Due diligence Distance aux états critiques Approche par Filtres Diagnosis Conspiracy Santa Control-flow graph Communication security Automates programmables Cyberattacks Laser fault injection Critical state distance Diagnostic Formal verification Authenticated encryption with associated data Bow-Tie analysis Architecture de défense Deobfuscation FDSOI Asynchronous design SCADA Approche Filtre Asynchronous logic Filter Approach Cyber Security Group key distribution Fault injection