index - Grenoble Alpes Cybersecurity Institute

The Grenoble Alpes Cybersecurity Institute aims at undertaking ground-breaking interdisciplinary research in order to address cybersecurity and privacy challenges. Our main technical focus is on low-cost secure elements, critical infrastructures, vulnerability analysis and validation of large systems, including practical resilience across the industry and the society. Our approach to cybersecurity is holistic, encompassing technical, legal, law-enforcement, economic, social, diplomatic, military and intelligence-related aspects with strong partnerships with the private sector and robust national and international cooperation with leading institutions in France and abroad.

 Instructions to authors

Please don't forget  to mention the following in your articles:

"Ce travail a bénéficié d'une aide de l'Etat gérée par l'Agence Nationale de la Recherche au titre du programme "Investissements d'avenir" portant la référence ANR-15-IDEX-02"

or

"This work is supported by the French National Research Agency in the framework of the "Investissements d’avenir” program (ANR-15-IDEX-02)"

 

Last publications

 

 

 

Key words

Safety Simulation Cybersécurité Encoding Security GDPR Opaque predicate Ring oscillator RO Privacy Formal methods Fault model Risk assessment Diagnosis Risk analysis Multi-Fault Attack Allan variance ANALYSE DES RISQUES Adversarial examples Address randomization Zero-knowledge proofs EMFI AEAD Fault injection attack Re-identification Physically unclonable function PUF Industrial systems Approche par Filtres Microarchitecture Authentication Encryption AES low-cost hardware IEEE 1687 IoT Adapted modular number system Fault injection attacks Fault injection robustness evaluation Side-channel ADCs Malware Emulation Adaptive Attackers Machine learning Multiple fault-injection Security and privacy Laser Fault Injection Mutual information OT Cyber-attacks Cybersecurity Architecture de défense Authorization Clock glitching Accès sécurisé Hardware Secure Access Detection Adversarial perturbation Puzzle Fault injection Fault detection Microcontroller Automated Test Environments Système de contrôle-commande industriel Dynamic-symbolic execution Artificial Intelligence Fault attacks Access tokens Reverse engineering SCADA Source code static analysis Obfuscation Deep learning IT FPGA Card-based secure two-party protocols X-Ray Anonymisation Symbolic execution Fault Injection Simulation Approche Filtre ASCON Countermeasures PQC Hardware performance counters Hardware security Artificial Neural Network Blockchain Secure access WooKey bootloader use-case Attacks ICS Reliability Deobfuscation Aging Code analysis Automated test environment Variable-length instruction set Masking Micro-architecture Side-channel attacks