index - Grenoble Alpes Cybersecurity Institute Access content directly

The Grenoble Alpes Cybersecurity Institute aims at undertaking ground-breaking interdisciplinary research in order to address cybersecurity and privacy challenges. Our main technical focus is on low-cost secure elements, critical infrastructures, vulnerability analysis and validation of large systems, including practical resilience across the industry and the society. Our approach to cybersecurity is holistic, encompassing technical, legal, law-enforcement, economic, social, diplomatic, military and intelligence-related aspects with strong partnerships with the private sector and robust national and international cooperation with leading institutions in France and abroad.

 

Instructions to authors

Please don't forget  to mention the following in your articles:

"Ce travail a bénéficié d'une aide de l'Etat gérée par l'Agence Nationale de la Recherche au titre du programme "Investissements d'avenir" portant la référence ANR-15-IDEX-02"

or

"This work is supported by the French National Research Agency in the framework of the "Investissements d’avenir” program (ANR-15-IDEX-02)"

 

 

Last publications

 

 

 

Key words

Safety Behavioral Model Simulation Opaque predicate Risk assessment Mutual information Deep learning ADCs Chosen Ciphertext Attack Micro-architecture Encryption Industrial systems Masking Detection IEEE 1687 IT Secure access PQC IoT Reliability Bow-Tie analysis Cybersécurité Automated test environment Ciphers Reverse engineering BBICS CYBERSÉCURITÉ Fault model Artificial Neural Network Fault detection Callbacks Fault injection attack Symbolic execution Hardware security Allan variance CMOS bulk Circuit-aging Privacy Code cloning OT Asynchronous circuit ASCON Fault attacks FPGA Certification Aging Risk analysis Asynchronous design Laser fault injection Cheese microbial ecology Machine learning Address randomization Cache side-channel attacks CADP Clocks Attack-Tree analysis Asymmetric Cryptography SCADA Access tokens AEAD AES low-cost hardware Clock glitching Attacks Security Authorization Authenticated encryption with associated data ICS Authentication Accès sécurisé Secure Access Deobfuscation Système de contrôle-commande industriel Automated Test Environments Zero-knowledge proofs BIST Clock glitch ANALYSE DES RISQUES Approche par Filtres Fault injection Architecture de défense Malware Circuit Aging Automated reasoning Emulation Behavioral based-IDS Cybersecurity Hardware performance counters Obfuscation Puzzle Approche Filtre CMOS Bulk Asynchronous logic Countermeasures Blockchain Automated verification Card-based secure two-party protocols Clock glitch fault injection Diagnosis Automates programmables Microarchitecture