index - Grenoble Alpes Cybersecurity Institute Access content directly

The Grenoble Alpes Cybersecurity Institute aims at undertaking ground-breaking interdisciplinary research in order to address cybersecurity and privacy challenges. Our main technical focus is on low-cost secure elements, critical infrastructures, vulnerability analysis and validation of large systems, including practical resilience across the industry and the society. Our approach to cybersecurity is holistic, encompassing technical, legal, law-enforcement, economic, social, diplomatic, military and intelligence-related aspects with strong partnerships with the private sector and robust national and international cooperation with leading institutions in France and abroad.


Instructions to authors

Please don't forget  to mention the following in your articles:

"Ce travail a bénéficié d'une aide de l'Etat gérée par l'Agence Nationale de la Recherche au titre du programme "Investissements d'avenir" portant la référence ANR-15-IDEX-02"


"This work is supported by the French National Research Agency in the framework of the "Investissements d’avenir” program (ANR-15-IDEX-02)"



Last publications




Key words

Authenticated encryption with associated data Control-flow graph Reverse engineering ANALYSE DES RISQUES Cybersecurity FD-SOI Cyber-security Combinational constraints Discrete Event System Opaque predicate Obfuscation Differential Fault Analysis Compétition Communication security CADP Cyberattacks Formal verification Zero-knowledge proofs Authentication Privacy First-order logic Asynchronous design Asynchronous circuit Cyber Sécurité Discrete event system Machine learning Automates programmables Discrete event systems Architecture de défense Distance Card-based secure two-party protocols CMOS Bulk Functional safety Cryptocurrency Système de contrôle-commande industriel Laser fault injection Attack-Tree analysis Compilation Execute In Place BBICS Cyber-attacks Data protection Conspiracy Santa Industrial systems Distance aux états critiques Computer-aided design SCADA AEAD FDSOI Filtre Filter approach Ensemble learning Symbolic execution Blockchain Approche Filtre Counterfeit Diagnostic Approche par Filtres Asynchronous logic Cyber security Cybersécurité Bow-Tie analysis Cyber Attaque Critical state distance Fault detection CYBERSÉCURITÉ Détection Cybersécurité des systèmes industriels Enseignement Cyber Security Puzzle Access tokens Due diligence Behavioral Model Diagnosis Clocks DFA Cyberspace AES low-cost hardware Deobfuscation Flow integrity Cyber Attacks Concurrency CMOS bulk Authorization EM Automated verification Filter Approach Cyber Physical Systems Code cloning Critical states distance Cyber Countermeasures Digitalization DES Finger- prints Fault injection Control and security for critical infrastructure systems Automated reasoning Behavioral based-IDS