index - Grenoble Alpes Cybersecurity Institute Access content directly

The Grenoble Alpes Cybersecurity Institute aims at undertaking ground-breaking interdisciplinary research in order to address cybersecurity and privacy challenges. Our main technical focus is on low-cost secure elements, critical infrastructures, vulnerability analysis and validation of large systems, including practical resilience across the industry and the society. Our approach to cybersecurity is holistic, encompassing technical, legal, law-enforcement, economic, social, diplomatic, military and intelligence-related aspects with strong partnerships with the private sector and robust national and international cooperation with leading institutions in France and abroad.

 Instructions to authors

Please don't forget  to mention the following in your articles:

"Ce travail a bénéficié d'une aide de l'Etat gérée par l'Agence Nationale de la Recherche au titre du programme "Investissements d'avenir" portant la référence ANR-15-IDEX-02"

or

"This work is supported by the French National Research Agency in the framework of the "Investissements d’avenir” program (ANR-15-IDEX-02)"

 

Last publications

 

 

 

Key words

Cybersécurité Diagnosis Obfuscation Hardware performance counters Machine learning EMFI Detection Physically unclonable function PUF Asynchronous design Safety Adaptive Attackers WooKey bootloader use-case Secure access X-Ray Asynchronous logic Multi-Fault Attack Encryption Système de contrôle-commande industriel Approche par Filtres ICS Code analysis Deep learning Adversarial examples Security Privacy Deobfuscation GDPR Emulation Fault detection Fault injection robustness evaluation Opaque predicate PQC FPGA ASCON Mutual information SCADA Artificial Intelligence Attack-Tree analysis Fault injection Fault attacks Risk assessment Fault Injection Simulation Approche Filtre Fault injection attack Source code static analysis Access tokens Card-based secure two-party protocols AES low-cost hardware Asymmetric Cryptography IEEE 1687 Cybersecurity Reverse engineering Automated test environment Authorization Simulation Artificial Neural Network Ring oscillator RO Dynamic-symbolic execution Accès sécurisé Aging Masking Multiple fault-injection Microcontroller Security and privacy Authentication Clock glitching Countermeasures IT Asynchronous circuit Formal methods Hardware Risk analysis Architecture de défense Side-channel attacks Allan variance Industrial systems Adversarial perturbation AEAD Reliability Side-channel Laser Fault Injection Encoding IoT Puzzle ANALYSE DES RISQUES Malware Hardware security ADCs Address randomization Microarchitecture Secure Access Artificial neural network ANN Zero-knowledge proofs Fault model Anonymisation Symbolic execution Micro-architecture OT Automated Test Environments Attacks