index - Grenoble Alpes Cybersecurity Institute

The Grenoble Alpes Cybersecurity Institute aims at undertaking ground-breaking interdisciplinary research in order to address cybersecurity and privacy challenges. Our main technical focus is on low-cost secure elements, critical infrastructures, vulnerability analysis and validation of large systems, including practical resilience across the industry and the society. Our approach to cybersecurity is holistic, encompassing technical, legal, law-enforcement, economic, social, diplomatic, military and intelligence-related aspects with strong partnerships with the private sector and robust national and international cooperation with leading institutions in France and abroad.

 Instructions to authors

Please don't forget  to mention the following in your articles:

"Ce travail a bénéficié d'une aide de l'Etat gérée par l'Agence Nationale de la Recherche au titre du programme "Investissements d'avenir" portant la référence ANR-15-IDEX-02"

or

"This work is supported by the French National Research Agency in the framework of the "Investissements d’avenir” program (ANR-15-IDEX-02)"

 

Last publications

 

 

 

Key words

Variable-length instruction set Automated test environment FPGA Système de contrôle-commande industriel Fault model Adversarial examples Allan variance ASCON IT Puzzle Deobfuscation Multiple fault-injection Malware Authentication Blockchain Diagnosis Dynamic-symbolic execution Machine learning Symbolic execution Hardware security Hardware performance counters Fault Injection Simulation Opaque predicate Fault injection robustness evaluation Micro-architecture Fault injection Risk analysis Fault injection attack Security Adaptive Attackers Multi-Fault Attack Industrial systems Approche par Filtres Secure Access Cyber-attacks Artificial Intelligence Countermeasures Adapted modular number system AEAD Attacks Accès sécurisé Approche Filtre Reverse engineering Authorization Adversarial perturbation IEEE 1687 Fault injection attacks IoT Clock glitching GDPR Cybersécurité Simulation Encoding Emulation Zero-knowledge proofs Cybersecurity Microarchitecture Secure access Architecture de défense Encryption Security and privacy EMFI Automated Test Environments Artificial Neural Network PQC Masking Safety Risk assessment Anonymisation Obfuscation ICS Microcontroller Formal methods ADCs Side-channel Address randomization SCADA Code analysis Fault detection Fault attacks Laser Fault Injection Side-channel attacks Card-based secure two-party protocols ANALYSE DES RISQUES Reliability Ring oscillator RO OT Access tokens Mutual information Physically unclonable function PUF X-Ray AES low-cost hardware Detection Aging Deep learning Re-identification Source code static analysis Hardware Privacy WooKey bootloader use-case