index - Grenoble Alpes Cybersecurity Institute Access content directly

The Grenoble Alpes Cybersecurity Institute aims at undertaking ground-breaking interdisciplinary research in order to address cybersecurity and privacy challenges. Our main technical focus is on low-cost secure elements, critical infrastructures, vulnerability analysis and validation of large systems, including practical resilience across the industry and the society. Our approach to cybersecurity is holistic, encompassing technical, legal, law-enforcement, economic, social, diplomatic, military and intelligence-related aspects with strong partnerships with the private sector and robust national and international cooperation with leading institutions in France and abroad.

 

Instructions to authors

Please don't forget  to mention the following in your articles:

"Ce travail a bénéficié d'une aide de l'Etat gérée par l'Agence Nationale de la Recherche au titre du programme "Investissements d'avenir" portant la référence ANR-15-IDEX-02"

or

"This work is supported by the French National Research Agency in the framework of the "Investissements d’avenir” program (ANR-15-IDEX-02)"

 

 

Last publications

Chargement de la page

 

 

 

Key words

Compilation Due diligence Cyber Sécurité Symbolic execution Authentication Control-flow graph ANALYSE DES RISQUES Functional safety Concurrency Differential Fault Analysis Attack-Tree analysis Laser fault injection Automates programmables Conspiracy Santa Countermeasures Obfuscation Authorization Computer-aided design Filtre EM Discrete event systems Communication security Formal verification FDSOI Asynchronous logic Cybersécurité Filter approach Ensemble learning CADP Execute In Place Discrete event system Deobfuscation Cyber-security Machine learning SCADA Approche Filtre Discrete Event System Cyber Physical Systems Cyber Security Compétition AES low-cost hardware CYBERSÉCURITÉ Enseignement Système de contrôle-commande industriel Cybersécurité des systèmes industriels Digitalization Cyber Attaque AEAD Cyber Architecture de défense DES Approche par Filtres Asynchronous design Filter Approach CMOS Bulk Détection Behavioral based-IDS Behavioral Model Cyber-attacks Industrial systems Control and security for critical infrastructure systems Automated reasoning Flow integrity CMOS bulk Cybersecurity Cyber Attacks Cyberattacks Counterfeit Cyber security Data protection Diagnostic Distance aux états critiques Privacy Code cloning Fault detection Reverse engineering Puzzle Automated verification Opaque predicate First-order logic Critical state distance Critical states distance Distance Asynchronous circuit DFA Diagnosis Cryptocurrency Combinational constraints FD-SOI Cyberspace Finger- prints Zero-knowledge proofs Clocks Blockchain Access tokens Card-based secure two-party protocols BBICS Fault injection Authenticated encryption with associated data Bow-Tie analysis