index - Grenoble Alpes Cybersecurity Institute Access content directly

The Grenoble Alpes Cybersecurity Institute aims at undertaking ground-breaking interdisciplinary research in order to address cybersecurity and privacy challenges. Our main technical focus is on low-cost secure elements, critical infrastructures, vulnerability analysis and validation of large systems, including practical resilience across the industry and the society. Our approach to cybersecurity is holistic, encompassing technical, legal, law-enforcement, economic, social, diplomatic, military and intelligence-related aspects with strong partnerships with the private sector and robust national and international cooperation with leading institutions in France and abroad.

 Instructions to authors

Please don't forget  to mention the following in your articles:

"Ce travail a bénéficié d'une aide de l'Etat gérée par l'Agence Nationale de la Recherche au titre du programme "Investissements d'avenir" portant la référence ANR-15-IDEX-02"

or

"This work is supported by the French National Research Agency in the framework of the "Investissements d’avenir” program (ANR-15-IDEX-02)"

 

Last publications

 

 

 

Key words

ICS Authentication Code analysis Malware Side-channel attacks Mutual information Puzzle Artificial neural network ANN ADCs Fault injection Attack-Tree analysis Anonymisation Adversarial perturbation Cybersécurité SCADA Secure Access Encoding AEAD Masking Système de contrôle-commande industriel FPGA WooKey bootloader use-case Security Simulation Fault attacks Countermeasures Architecture de défense Hardware Source code static analysis Attacks Fault injection attack OT Emulation Artificial Neural Network Aging Address randomization Hardware security Hardware performance counters Secure access Multiple fault-injection Opaque predicate Access tokens Authorization Allan variance Laser Fault Injection Asymmetric Cryptography ANALYSE DES RISQUES Microcontroller Multi-Fault Attack AES low-cost hardware Symbolic execution Reliability Automated test environment Fault injection robustness evaluation Dynamic-symbolic execution Deep learning Asynchronous logic Approche par Filtres Privacy Machine learning X-Ray Safety Security and privacy Adaptive Attackers IoT Encryption Physically unclonable function PUF IEEE 1687 Micro-architecture Approche Filtre IT PQC Detection Risk assessment Fault model Cybersecurity Microarchitecture Zero-knowledge proofs Accès sécurisé Diagnosis Formal methods EMFI GDPR Asynchronous circuit Deobfuscation Industrial systems Obfuscation ASCON Adversarial examples Card-based secure two-party protocols Ring oscillator RO Side-channel Asynchronous design Artificial Intelligence Clock glitching Risk analysis Reverse engineering Automated Test Environments Fault Injection Simulation Fault detection