index - Grenoble Alpes Cybersecurity Institute Access content directly

The Grenoble Alpes Cybersecurity Institute aims at undertaking ground-breaking interdisciplinary research in order to address cybersecurity and privacy challenges. Our main technical focus is on low-cost secure elements, critical infrastructures, vulnerability analysis and validation of large systems, including practical resilience across the industry and the society. Our approach to cybersecurity is holistic, encompassing technical, legal, law-enforcement, economic, social, diplomatic, military and intelligence-related aspects with strong partnerships with the private sector and robust national and international cooperation with leading institutions in France and abroad.

 Instructions to authors

Please don't forget  to mention the following in your articles:

"Ce travail a bénéficié d'une aide de l'Etat gérée par l'Agence Nationale de la Recherche au titre du programme "Investissements d'avenir" portant la référence ANR-15-IDEX-02"

or

"This work is supported by the French National Research Agency in the framework of the "Investissements d’avenir” program (ANR-15-IDEX-02)"

 

Last publications

 

 

 

Key words

Formal methods Automated test environment Detection Artificial Intelligence Microarchitecture Aging Risk assessment Adversarial perturbation Obfuscation GDPR Multi-Fault Attack Asynchronous design Micro-architecture Hardware performance counters Microcontroller Hardware Reliability Countermeasures Approche Filtre Privacy Emulation Side-channel Mutual information ANALYSE DES RISQUES Code analysis Clock glitching Multiple fault-injection Diagnosis Encoding Card-based secure two-party protocols Fault injection robustness evaluation Fault injection attack Industrial systems Fault attacks Opaque predicate Deep learning SCADA X-Ray Artificial neural network ANN Security and privacy Security PQC Secure Access Puzzle ICS WooKey bootloader use-case Reverse engineering Fault Injection Simulation AEAD Anonymisation Ring oscillator RO ASCON Authorization Approche par Filtres IT EMFI Source code static analysis FPGA Simulation Allan variance Masking Zero-knowledge proofs Adaptive Attackers ADCs Attacks Cybersécurité IEEE 1687 OT Authentication Asymmetric Cryptography Asynchronous circuit Encryption Cybersecurity Fault model Système de contrôle-commande industriel Machine learning Access tokens Secure access Safety Automated Test Environments Fault injection AES low-cost hardware Laser Fault Injection Accès sécurisé Address randomization Attack-Tree analysis Risk analysis Dynamic-symbolic execution Architecture de défense Artificial Neural Network Deobfuscation Symbolic execution Adversarial examples Asynchronous logic Fault detection Side-channel attacks IoT Hardware security Physically unclonable function PUF Malware