Skip to Main content Skip to Navigation

The Grenoble Alpes Cybersecurity Institute aims at undertaking ground-breaking interdisciplinary research in order to address cybersecurity and privacy challenges. Our main technical focus is on low-cost secure elements, critical infrastructures, vulnerability analysis and validation of large systems, including practical resilience across the industry and the society. Our approach to cybersecurity is holistic, encompassing technical, legal, law-enforcement, economic, social, diplomatic, military and intelligence-related aspects with strong partnerships with the private sector and robust national and international cooperation with leading institutions in France and abroad.


Instructions to authors

Please don't forget  to mention the following in your articles:

"Ce travail a bénéficié d'une aide de l'Etat gérée par l'Agence Nationale de la Recherche au titre du programme "Investissements d'avenir" portant la référence ANR-15-IDEX-02"


"This work is supported by the French National Research Agency in the framework of the "Investissements d’avenir” program (ANR-15-IDEX-02)"



Last publications




Key words

Asynchronous logic Distance aux états critiques AES low-cost hardware Cybersecurity Flow integrity Cyber-attacks Ensemble learning Cyberspace Opaque predicate Cyber Sécurité Behavioral based-IDS Automated reasoning Compilation Bow-Tie analysis Authenticated encryption with associated data Filtre Cyber Attacks Control and security for critical infrastructure systems Data protection Functional safety Approche Filtre Group key distribution DES Cyber Attaque Industrial systems Cybersécurité des systèmes industriels Machine learning Détection DFA Card-based secure two-party protocols FD-SOI Puzzle Cyber security Discrete event system Automated verification Combinational constraints Clocks Discrete event systems CADP Execute In Place Authentication SCADA Cyber Physical Systems Finger- prints FDSOI Obfuscation Computer-aided design Automates programmables Behavioral Model AEAD Control-flow graph GDPR Symbolic execution Digitalization Filter approach Diagnosis Asynchronous design CYBERSÉCURITÉ Blockchain Discrete Event System Attack-Tree analysis Cybersécurité BBICS Système de contrôle-commande industriel Critical states distance Critical state distance Distance Due diligence Cyber Security Reverse engineering Cyber Countermeasures Communication security Counterfeit Diagnostic Cryptocurrency Architecture de défense Deobfuscation Privacy Code cloning Access tokens Fault detection Cyberattacks Differential Fault Analysis EM Conspiracy Santa Concurrency First-order logic ANALYSE DES RISQUES CMOS bulk CMOS Bulk Zero-knowledge proofs Asynchronous circuit Cyber-security Fault injection Formal verification Filter Approach Approche par Filtres Authorization Laser fault injection