index - Grenoble Alpes Cybersecurity Institute

The Grenoble Alpes Cybersecurity Institute aims at undertaking ground-breaking interdisciplinary research in order to address cybersecurity and privacy challenges. Our main technical focus is on low-cost secure elements, critical infrastructures, vulnerability analysis and validation of large systems, including practical resilience across the industry and the society. Our approach to cybersecurity is holistic, encompassing technical, legal, law-enforcement, economic, social, diplomatic, military and intelligence-related aspects with strong partnerships with the private sector and robust national and international cooperation with leading institutions in France and abroad.

 Instructions to authors

Please don't forget  to mention the following in your articles:

"Ce travail a bénéficié d'une aide de l'Etat gérée par l'Agence Nationale de la Recherche au titre du programme "Investissements d'avenir" portant la référence ANR-15-IDEX-02"

or

"This work is supported by the French National Research Agency in the framework of the "Investissements d’avenir” program (ANR-15-IDEX-02)"

 

Last publications

 

 

 

Key words

Industrial systems Architecture de défense Cyber-attacks IT Obfuscation Fault Injection Simulation Fault model Automated test environment Secure access Risk assessment Microcontroller FPGA Adversarial perturbation Fault injection Fault injection attacks Fault detection OT Cybersécurité Countermeasures Ring oscillator RO Automated Test Environments Clock glitching Anonymisation Security Multiple fault-injection Opaque predicate EMFI Safety Address randomization Accès sécurisé Microarchitecture Deobfuscation Micro-architecture PQC Deep learning Cybersecurity Dynamic-symbolic execution Adaptive Attackers Masking Symbolic execution WooKey bootloader use-case Emulation Authorization Resilience Machine learning Encryption Fault injection robustness evaluation Adapted modular number system X-Ray Formal methods Encoding Variable-length instruction set Detection Fault injection attack Source code static analysis ADCs Simulation Puzzle Hardware Re-identification Authentication Card-based secure two-party protocols Physically unclonable function PUF Hardware performance counters GDPR Multi-Fault Attack AI Approche Filtre Laser Fault Injection Diagnosis AES low-cost hardware SCADA Hardware security Système de contrôle-commande industriel ANALYSE DES RISQUES IoT Allan variance ICS Reliability IEEE 1687 Zero-knowledge proofs Side-channel Privacy Fault attacks Approche par Filtres Aging Code analysis Access tokens Security and privacy Risk analysis Attacks Reverse engineering Side-channel attacks Blockchain ASCON Secure Access Adversarial examples Malware AEAD Mutual information