index - Grenoble Alpes Cybersecurity Institute

The Grenoble Alpes Cybersecurity Institute aims at undertaking ground-breaking interdisciplinary research in order to address cybersecurity and privacy challenges. Our main technical focus is on low-cost secure elements, critical infrastructures, vulnerability analysis and validation of large systems, including practical resilience across the industry and the society. Our approach to cybersecurity is holistic, encompassing technical, legal, law-enforcement, economic, social, diplomatic, military and intelligence-related aspects with strong partnerships with the private sector and robust national and international cooperation with leading institutions in France and abroad.

 Instructions to authors

Please don't forget  to mention the following in your articles:

"Ce travail a bénéficié d'une aide de l'Etat gérée par l'Agence Nationale de la Recherche au titre du programme "Investissements d'avenir" portant la référence ANR-15-IDEX-02"

or

"This work is supported by the French National Research Agency in the framework of the "Investissements d’avenir” program (ANR-15-IDEX-02)"

 

Last publications

 

 

 

Key words

Obfuscation Encoding IEEE 1687 Adversarial perturbation Secure Access Zero-knowledge proofs Detection AI Industrial systems Simulation Authorization IT FPGA Symbolic execution Diagnosis Privacy GDPR Anonymisation Automated test environment Cybersecurity Risk analysis Machine learning Emulation Approche Filtre Microarchitecture Resilience EMFI Physically unclonable function PUF Automated Test Environments Opaque predicate Re-identification Adaptive Attackers Security Fault model Side-channel attacks Encryption Code analysis Fault injection attacks Hardware security Architecture de défense Puzzle Adversarial examples IoT Clock glitching Safety Multiple fault-injection Source code static analysis Reliability Blockchain Deobfuscation Allan variance Système de contrôle-commande industriel Secure access Variable-length instruction set Approche par Filtres Laser Fault Injection Formal methods Cyber-attacks WooKey bootloader use-case Aging Authentication ANALYSE DES RISQUES Fault Injection Simulation Reverse engineering Masking ASCON Fault attacks Address randomization Multi-Fault Attack Countermeasures Mutual information Deep learning AEAD Fault detection SCADA Hardware performance counters Cybersécurité Accès sécurisé Access tokens Ring oscillator RO AES low-cost hardware Card-based secure two-party protocols OT Risk assessment Fault injection robustness evaluation Hardware Fault injection attack Micro-architecture ICS Attacks Dynamic-symbolic execution Security and privacy Malware Microcontroller X-Ray ADCs Adapted modular number system Side-channel PQC Fault injection