index - Grenoble Alpes Cybersecurity Institute

The Grenoble Alpes Cybersecurity Institute aims at undertaking ground-breaking interdisciplinary research in order to address cybersecurity and privacy challenges. Our main technical focus is on low-cost secure elements, critical infrastructures, vulnerability analysis and validation of large systems, including practical resilience across the industry and the society. Our approach to cybersecurity is holistic, encompassing technical, legal, law-enforcement, economic, social, diplomatic, military and intelligence-related aspects with strong partnerships with the private sector and robust national and international cooperation with leading institutions in France and abroad.

 Instructions to authors

Please don't forget  to mention the following in your articles:

"Ce travail a bénéficié d'une aide de l'Etat gérée par l'Agence Nationale de la Recherche au titre du programme "Investissements d'avenir" portant la référence ANR-15-IDEX-02"

or

"This work is supported by the French National Research Agency in the framework of the "Investissements d’avenir” program (ANR-15-IDEX-02)"

 

Last publications

 

 

 

Key words

Approche Filtre Secure Access Microarchitecture Opaque predicate Address randomization Access tokens Zero-knowledge proofs Dynamic-symbolic execution ANALYSE DES RISQUES Adapted modular number system Security Adversarial examples Puzzle SCADA Code analysis EMFI Countermeasures Side-channel Safety Blockchain Formal methods Machine learning Hardware performance counters Reliability Encoding Adaptive Attackers Masking Anonymisation Deep learning Ring oscillator RO Multi-Fault Attack Authentication Clock glitching Physically unclonable function PUF X-Ray Fault injection robustness evaluation Fault model Symbolic execution Artificial Neural Network Automated test environment Side-channel attacks Re-identification ICS Detection OT Fault Injection Simulation Encryption Multiple fault-injection Laser Fault Injection Approche par Filtres Malware Cybersécurité WooKey bootloader use-case IEEE 1687 FPGA Diagnosis Fault detection PQC Allan variance Artificial Intelligence IT Aging Risk assessment Système de contrôle-commande industriel Risk analysis Obfuscation Variable-length instruction set ASCON Accès sécurisé GDPR Deobfuscation Security and privacy Hardware Source code static analysis Privacy Microcontroller Micro-architecture IoT Fault injection attack Automated Test Environments Card-based secure two-party protocols Fault attacks Mutual information Cyber-attacks Hardware security AEAD Adversarial perturbation Attacks Industrial systems ADCs Simulation Reverse engineering Fault injection attacks Authorization Fault injection Cybersecurity Emulation AES low-cost hardware Secure access Architecture de défense