Skip to Main content Skip to Navigation

The Grenoble Alpes Cybersecurity Institute aims at undertaking ground-breaking interdisciplinary research in order to address cybersecurity and privacy challenges. Our main technical focus is on low-cost secure elements, critical infrastructures, vulnerability analysis and validation of large systems, including practical resilience across the industry and the society. Our approach to cybersecurity is holistic, encompassing technical, legal, law-enforcement, economic, social, diplomatic, military and intelligence-related aspects with strong partnerships with the private sector and robust national and international cooperation with leading institutions in France and abroad.

 

Instructions to authors

Please don't forget  to mention the following in your articles:

"Ce travail a bénéficié d'une aide de l'Etat gérée par l'Agence Nationale de la Recherche au titre du programme "Investissements d'avenir" portant la référence ANR-15-IDEX-02"

or

"This work is supported by the French National Research Agency in the framework of the "Investissements d’avenir” program (ANR-15-IDEX-02)"

 

 

Last publications

 

 

 

Key words

Machine learning Combinational constraints GDPR Critical states distance FDSOI FD-SOI Reverse engineering Diagnostic Group key distribution Blockchain Concurrency SCADA Functional safety CYBERSÉCURITÉ Automated reasoning Symbolic execution Ensemble learning Distance aux états critiques Control and security for critical infrastructure systems CADP Automates programmables BBICS Behavioral Model Opaque predicate Détection Card-based secure two-party protocols Authentication Discrete event system Puzzle Filter Approach ANALYSE DES RISQUES Cyber-security Authenticated encryption with associated data Asynchronous circuit First-order logic Filter approach Clocks Fault injection Architecture de défense Attack-Tree analysis Fault detection Cyber-attacks Behavioral based-IDS Diagnosis Cyberattacks Bow-Tie analysis Cyber Sécurité Filtre Cyber Attaque Formal verification Cyber Physical Systems Cybersécurité Asynchronous design CMOS Bulk Système de contrôle-commande industriel AES low-cost hardware Code cloning Asynchronous logic Finger- prints Zero-knowledge proofs Conspiracy Santa Digitalization Compilation Cyber DFA Automated verification Distance Cyberspace Cyber security Authorization Cyber Security Differential Fault Analysis Cryptocurrency Deobfuscation Discrete Event System Critical state distance DES Discrete event systems Obfuscation Countermeasures Access tokens Laser fault injection Flow integrity Industrial systems Execute In Place Cybersécurité des systèmes industriels Due diligence CMOS bulk Cyber Attacks Communication security Computer-aided design EM Cybersecurity Approche par Filtres Counterfeit Data protection Control-flow graph AEAD Approche Filtre Privacy