Skip to Main content Skip to Navigation

The Grenoble Alpes Cybersecurity Institute aims at undertaking ground-breaking interdisciplinary research in order to address cybersecurity and privacy challenges. Our main technical focus is on low-cost secure elements, critical infrastructures, vulnerability analysis and validation of large systems, including practical resilience across the industry and the society. Our approach to cybersecurity is holistic, encompassing technical, legal, law-enforcement, economic, social, diplomatic, military and intelligence-related aspects with strong partnerships with the private sector and robust national and international cooperation with leading institutions in France and abroad.


Instructions to authors

Please don't forget  to mention the following in your articles:

"Ce travail a bénéficié d'une aide de l'Etat gérée par l'Agence Nationale de la Recherche au titre du programme "Investissements d'avenir" portant la référence ANR-15-IDEX-02"


"This work is supported by the French National Research Agency in the framework of the "Investissements d’avenir” program (ANR-15-IDEX-02)"



Last publications




Key words

Code cloning Filter Approach Computer-aided design Cybersécurité Symbolic execution CMOS Bulk Discrete event system DFA Cryptocurrency Bow-Tie analysis Cyber FD-SOI Flow integrity Diagnosis Access tokens Laser fault injection Concurrency Control-flow graph Authenticated encryption with associated data Combinational constraints Automated reasoning SCADA Attack-Tree analysis Cybersécurité des systèmes industriels Blockchain First-order logic CMOS bulk Counterfeit Functional safety Filter approach Automated verification Cyberspace AES low-cost hardware Obfuscation EM Approche par Filtres Conspiracy Santa FDSOI AEAD Diagnostic Approche Filtre Puzzle Critical state distance Cyber security BBICS Compilation Machine learning Clocks Behavioral based-IDS Formal verification Fault detection CYBERSÉCURITÉ Critical states distance Système de contrôle-commande industriel Cyber Physical Systems Authentication Card-based secure two-party protocols Cyber Attaque Zero-knowledge proofs Ensemble learning Countermeasures Cyber-attacks Détection Fault injection Deobfuscation Opaque predicate Privacy Digitalization Discrete event systems Asynchronous design Automates programmables Cyber Attacks Cyber-security Differential Fault Analysis Cyberattacks Distance aux états critiques Cyber Sécurité Architecture de défense Asynchronous logic Execute In Place Filtre Discrete Event System Authorization Due diligence Cyber Security Control and security for critical infrastructure systems DES Communication security GDPR Finger- prints Industrial systems ANALYSE DES RISQUES CADP Reverse engineering Asynchronous circuit Behavioral Model Data protection Cybersecurity Group key distribution Distance