Skip to Main content Skip to Navigation

The Grenoble Alpes Cybersecurity Institute aims at undertaking ground-breaking interdisciplinary research in order to address cybersecurity and privacy challenges. Our main technical focus is on low-cost secure elements, critical infrastructures, vulnerability analysis and validation of large systems, including practical resilience across the industry and the society. Our approach to cybersecurity is holistic, encompassing technical, legal, law-enforcement, economic, social, diplomatic, military and intelligence-related aspects with strong partnerships with the private sector and robust national and international cooperation with leading institutions in France and abroad.


Instructions to authors

Please don't forget  to mention the following in your articles:

"Ce travail a bénéficié d'une aide de l'Etat gérée par l'Agence Nationale de la Recherche au titre du programme "Investissements d'avenir" portant la référence ANR-15-IDEX-02"


"This work is supported by the French National Research Agency in the framework of the "Investissements d’avenir” program (ANR-15-IDEX-02)"



Last publications




Key words

Cyberspace Code cloning Bow-Tie analysis Fault injection Cyber Attaque Countermeasures Discrete event system ANALYSE DES RISQUES Cyber-attacks Behavioral based-IDS Deobfuscation BBICS Opaque predicate Cybersécurité Execute In Place Diagnosis Filter approach Système de contrôle-commande industriel Finger- prints Digitalization Machine learning Due diligence Puzzle Access tokens Control-flow graph Clocks Cyberattacks Cybersecurity Discrete event systems Approche par Filtres Functional safety Automated verification Cyber Blockchain Data protection Distance Asynchronous logic Ensemble learning CADP Reverse engineering Card-based secure two-party protocols Cyber security Cybersécurité des systèmes industriels Automates programmables Authentication Flow integrity Attack-Tree analysis Symbolic execution Fault detection CMOS Bulk Automated reasoning Zero-knowledge proofs First-order logic Behavioral Model Formal verification Discrete Event System GDPR CYBERSÉCURITÉ Concurrency SCADA EM Cyber-security Authenticated encryption with associated data Cyber Sécurité Authorization Industrial systems Conspiracy Santa FD-SOI Critical states distance AEAD Détection Group key distribution Computer-aided design CMOS bulk Cyber Attacks Counterfeit Approche Filtre DFA DES Cyber Physical Systems Obfuscation Combinational constraints Communication security Asynchronous circuit FDSOI Diagnostic Filtre Privacy Distance aux états critiques Cyber Security AES low-cost hardware Cryptocurrency Laser fault injection Control and security for critical infrastructure systems Critical state distance Architecture de défense Compilation Filter Approach Differential Fault Analysis Asynchronous design