index - Grenoble Alpes Cybersecurity Institute

The Grenoble Alpes Cybersecurity Institute aims at undertaking ground-breaking interdisciplinary research in order to address cybersecurity and privacy challenges. Our main technical focus is on low-cost secure elements, critical infrastructures, vulnerability analysis and validation of large systems, including practical resilience across the industry and the society. Our approach to cybersecurity is holistic, encompassing technical, legal, law-enforcement, economic, social, diplomatic, military and intelligence-related aspects with strong partnerships with the private sector and robust national and international cooperation with leading institutions in France and abroad.

 Instructions to authors

Please don't forget  to mention the following in your articles:

"Ce travail a bénéficié d'une aide de l'Etat gérée par l'Agence Nationale de la Recherche au titre du programme "Investissements d'avenir" portant la référence ANR-15-IDEX-02"

or

"This work is supported by the French National Research Agency in the framework of the "Investissements d’avenir” program (ANR-15-IDEX-02)"

 

Last publications

 

 

 

Key words

Machine learning Secure Access Address randomization Security and privacy Adversarial examples Puzzle Reliability Zero-knowledge proofs Microcontroller Deep learning Symbolic execution Side-channel Fault detection Fault injection attacks Opaque predicate Simulation Adversarial perturbation EMFI Blockchain FPGA Approche Filtre Malware GDPR SCADA Re-identification Artificial Neural Network Fault model Access tokens Security Cybersecurity Emulation Industrial systems IT Micro-architecture AES low-cost hardware Laser Fault Injection ICS Secure access Countermeasures Deobfuscation Privacy Code analysis Hardware performance counters Masking Multiple fault-injection Ring oscillator RO Attacks Automated test environment Encoding Architecture de défense Artificial Intelligence Fault Injection Simulation Diagnosis Physically unclonable function PUF Cybersécurité Detection Approche par Filtres Adapted modular number system Allan variance Hardware IEEE 1687 Fault injection Clock glitching Safety Système de contrôle-commande industriel ADCs PQC Adaptive Attackers Authorization Fault attacks Microarchitecture ASCON Hardware security OT Mutual information Aging Authentication X-Ray IoT Encryption Source code static analysis ANALYSE DES RISQUES Obfuscation Risk analysis Formal methods Card-based secure two-party protocols Side-channel attacks Variable-length instruction set Anonymisation Automated Test Environments Dynamic-symbolic execution Reverse engineering Cyber-attacks Fault injection robustness evaluation AEAD Multi-Fault Attack WooKey bootloader use-case Accès sécurisé Risk assessment Fault injection attack