index - Grenoble Alpes Cybersecurity Institute

The Grenoble Alpes Cybersecurity Institute aims at undertaking ground-breaking interdisciplinary research in order to address cybersecurity and privacy challenges. Our main technical focus is on low-cost secure elements, critical infrastructures, vulnerability analysis and validation of large systems, including practical resilience across the industry and the society. Our approach to cybersecurity is holistic, encompassing technical, legal, law-enforcement, economic, social, diplomatic, military and intelligence-related aspects with strong partnerships with the private sector and robust national and international cooperation with leading institutions in France and abroad.

 Instructions to authors

Please don't forget  to mention the following in your articles:

"Ce travail a bénéficié d'une aide de l'Etat gérée par l'Agence Nationale de la Recherche au titre du programme "Investissements d'avenir" portant la référence ANR-15-IDEX-02"

or

"This work is supported by the French National Research Agency in the framework of the "Investissements d’avenir” program (ANR-15-IDEX-02)"

 

Last publications

 

 

 

Key words

Side-channel Reverse engineering Microcontroller Architecture de défense IEEE 1687 ICS Adapted modular number system Side-channel attacks SCADA Encoding Malware Microarchitecture Masking Address randomization OT Attacks Source code static analysis Clock glitching Approche par Filtres Approche Filtre Fault injection robustness evaluation Fault injection attack Micro-architecture Fault injection Multi-Fault Attack Système de contrôle-commande industriel Industrial systems Blockchain X-Ray Mutual information Simulation Fault detection Ring oscillator RO Adversarial examples Hardware Artificial Intelligence Formal methods Allan variance Automated test environment ANALYSE DES RISQUES Hardware performance counters Cyber-attacks Variable-length instruction set Hardware security WooKey bootloader use-case Deep learning Cybersecurity Emulation Zero-knowledge proofs Deobfuscation Cybersécurité Code analysis Opaque predicate Laser Fault Injection Authentication Re-identification Card-based secure two-party protocols Encryption Secure Access FPGA Puzzle Multiple fault-injection Security and privacy Obfuscation Detection Adaptive Attackers Security Diagnosis Fault Injection Simulation Physically unclonable function PUF IT Artificial Neural Network Dynamic-symbolic execution Authorization AES low-cost hardware Anonymisation IoT EMFI Fault attacks Adversarial perturbation Machine learning Automated Test Environments Fault model Symbolic execution Fault injection attacks Secure access AEAD GDPR PQC Countermeasures Reliability Risk assessment ASCON Accès sécurisé Access tokens Safety ADCs Privacy Aging Risk analysis