HAL will be down for maintenance from Friday, June 10 at 4pm through Monday, June 13 at 9am. More information
Skip to Main content Skip to Navigation

The Grenoble Alpes Cybersecurity Institute aims at undertaking ground-breaking interdisciplinary research in order to address cybersecurity and privacy challenges. Our main technical focus is on low-cost secure elements, critical infrastructures, vulnerability analysis and validation of large systems, including practical resilience across the industry and the society. Our approach to cybersecurity is holistic, encompassing technical, legal, law-enforcement, economic, social, diplomatic, military and intelligence-related aspects with strong partnerships with the private sector and robust national and international cooperation with leading institutions in France and abroad.

 

Instructions to authors

Please don't forget  to mention the following in your articles:

"Ce travail a bénéficié d'une aide de l'Etat gérée par l'Agence Nationale de la Recherche au titre du programme "Investissements d'avenir" portant la référence ANR-15-IDEX-02"

or

"This work is supported by the French National Research Agency in the framework of the "Investissements d’avenir” program (ANR-15-IDEX-02)"

 

 

Last publications

 

 

 

Key words

Automates programmables Authorization Cyber-security Bow-Tie analysis Behavioral Model Filter approach Authentication AEAD Discrete Event System Digitalization Ensemble learning Asynchronous circuit Cyber security Critical states distance Distance aux états critiques Cyber-attacks Due diligence Code cloning Attack-Tree analysis SCADA Zero-knowledge proofs Cyberspace Access tokens Cyber Attacks CADP Industrial systems Behavioral based-IDS Compilation Conspiracy Santa Flow integrity Authenticated encryption with associated data Compétition Système de contrôle-commande industriel Cybersécurité Diagnostic Automated verification Enseignement Filtre CMOS bulk Cryptocurrency Privacy Combinational constraints Communication security Asynchronous logic Symbolic execution Asynchronous design Cybersécurité des systèmes industriels DFA CYBERSÉCURITÉ Cybersecurity Fault detection Card-based secure two-party protocols Distance Blockchain Puzzle Fault injection Concurrency FDSOI Cyber Physical Systems Formal verification Finger- prints Architecture de défense Data protection Countermeasures Execute In Place Cyber Filter Approach Laser fault injection Control-flow graph First-order logic Differential Fault Analysis Deobfuscation Control and security for critical infrastructure systems Détection FD-SOI Approche par Filtres CMOS Bulk Diagnosis Clocks Critical state distance Counterfeit Approche Filtre BBICS AES low-cost hardware Cyberattacks Functional safety Cyber Attaque Machine learning ANALYSE DES RISQUES Cyber Security Discrete event systems Computer-aided design EM Cyber Sécurité Reverse engineering Obfuscation Discrete event system Automated reasoning Opaque predicate DES