index - Grenoble Alpes Cybersecurity Institute Access content directly

The Grenoble Alpes Cybersecurity Institute aims at undertaking ground-breaking interdisciplinary research in order to address cybersecurity and privacy challenges. Our main technical focus is on low-cost secure elements, critical infrastructures, vulnerability analysis and validation of large systems, including practical resilience across the industry and the society. Our approach to cybersecurity is holistic, encompassing technical, legal, law-enforcement, economic, social, diplomatic, military and intelligence-related aspects with strong partnerships with the private sector and robust national and international cooperation with leading institutions in France and abroad.

 

Instructions to authors

Please don't forget  to mention the following in your articles:

"Ce travail a bénéficié d'une aide de l'Etat gérée par l'Agence Nationale de la Recherche au titre du programme "Investissements d'avenir" portant la référence ANR-15-IDEX-02"

or

"This work is supported by the French National Research Agency in the framework of the "Investissements d’avenir” program (ANR-15-IDEX-02)"

 

 

Last publications

 

 

 

Key words

Conspiracy Santa Cyber Physical Systems Système de contrôle-commande industriel Embedded system Behavioral Model Automated reasoning FPGA Privacy Computer-aided design Communication security Authentication Dedicated statistical tests Control and security for critical infrastructure systems Cyber Attaque Differential Fault Analysis Critical state distance Reliability CMOS Bulk BBICS Asynchronous design Reverse engineering Attack-Tree analysis Cybersécurité des systèmes industriels Obfuscation Automates programmables Asynchronous circuit DFA Behavioral based-IDS Cryptocurrency Cyber Sécurité SCADA Compétition Détection Card-based secure two-party protocols Symbolic execution Cyber security Data protection Architecture de défense Machine learning AES low-cost hardware CYBERSÉCURITÉ Cyber Attacks Industrial systems Clocks Countermeasures Distance Cyber-security Cybersecurity Correlation power analysis Concurrency Digitalization CADP Authenticated encryption with associated data Automated verification Cyber Convolutional Neural Network Laser fault injection Discrete Event System Authorization Control-flow graph Cyber-attacks Discrete event systems Puzzle Deobfuscation Asynchronous logic ANALYSE DES RISQUES Compilation Diagnostic Cyberspace Diagnosis Cyberattacks Fault detection Security EM Bow-Tie analysis Cybersécurité Combinational constraints Allan variance Blockchain Opaque predicate Computer security Cyber Security AEAD Electronic architecture PQC Approche par Filtres Due diligence Approche Filtre CMOS bulk Access tokens DES Zero-knowledge proofs Artificial Neural Network Counterfeit Discrete event system Critical states distance Distance aux états critiques Code cloning Ciphers Encryption