Skip to Main content Skip to Navigation

The Grenoble Alpes Cybersecurity Institute aims at undertaking ground-breaking interdisciplinary research in order to address cybersecurity and privacy challenges. Our main technical focus is on low-cost secure elements, critical infrastructures, vulnerability analysis and validation of large systems, including practical resilience across the industry and the society. Our approach to cybersecurity is holistic, encompassing technical, legal, law-enforcement, economic, social, diplomatic, military and intelligence-related aspects with strong partnerships with the private sector and robust national and international cooperation with leading institutions in France and abroad.


Instructions to authors

Please don't forget  to mention the following in your articles:

"Ce travail a bénéficié d'une aide de l'Etat gérée par l'Agence Nationale de la Recherche au titre du programme "Investissements d'avenir" portant la référence ANR-15-IDEX-02"


"This work is supported by the French National Research Agency in the framework of the "Investissements d’avenir” program (ANR-15-IDEX-02)"



Last publications




Key words

Symbolic execution Differential Fault Analysis EM Data protection Countermeasures DFA AES low-cost hardware Système de contrôle-commande industriel ANALYSE DES RISQUES Authorization Behavioral Model BBICS CYBERSÉCURITÉ Filter approach Deobfuscation Privacy Finger- prints Filtre Cyber Physical Systems AEAD Machine learning Compilation Puzzle Laser fault injection Cyber-security DES Zero-knowledge proofs Flow integrity FDSOI Authentication Card-based secure two-party protocols First-order logic Obfuscation Critical states distance Critical state distance Access tokens Combinational constraints Conspiracy Santa Blockchain GDPR CMOS bulk Digitalization Behavioral based-IDS Approche Filtre Diagnosis Automates programmables Cyber security Opaque predicate Fault injection Fault detection Asynchronous design Reverse engineering Counterfeit Automated reasoning Approche par Filtres Distance Control-flow graph CADP FD-SOI Communication security Clocks Group key distribution Ensemble learning Cyber Sécurité Filter Approach Bow-Tie analysis Code cloning Cryptocurrency Concurrency Architecture de défense Execute In Place CMOS Bulk Industrial systems Formal verification Automated verification Cyber Security Cyber Attaque Cybersécurité des systèmes industriels Cyber-attacks Functional safety Asynchronous logic Cybersécurité Distance aux états critiques Due diligence Control and security for critical infrastructure systems Cyberspace Attack-Tree analysis Diagnostic Cyberattacks Discrete event system Détection Cyber Attacks Asynchronous circuit Computer-aided design SCADA Cyber Authenticated encryption with associated data Discrete Event System Cybersecurity Discrete event systems