index - Grenoble Alpes Cybersecurity Institute Access content directly

The Grenoble Alpes Cybersecurity Institute aims at undertaking ground-breaking interdisciplinary research in order to address cybersecurity and privacy challenges. Our main technical focus is on low-cost secure elements, critical infrastructures, vulnerability analysis and validation of large systems, including practical resilience across the industry and the society. Our approach to cybersecurity is holistic, encompassing technical, legal, law-enforcement, economic, social, diplomatic, military and intelligence-related aspects with strong partnerships with the private sector and robust national and international cooperation with leading institutions in France and abroad.

 

Instructions to authors

Please don't forget  to mention the following in your articles:

"Ce travail a bénéficié d'une aide de l'Etat gérée par l'Agence Nationale de la Recherche au titre du programme "Investissements d'avenir" portant la référence ANR-15-IDEX-02"

or

"This work is supported by the French National Research Agency in the framework of the "Investissements d’avenir” program (ANR-15-IDEX-02)"

 

 

Last publications

 

 

 

Key words

ICS Mutual information Asynchronous design Système de contrôle-commande industriel Hardware performance counters Fault injection Hardware security OT Aging Card-based secure two-party protocols Artificial Neural Network Formal methods Secure access ASCON Obfuscation AEAD Microarchitecture Multiple fault-injection Privacy Puzzle Anonymisation Fault Injection Simulation Fault attacks Adversarial perturbation Accès sécurisé Zero-knowledge proofs Security X-Ray ADCs Fault model Encoding Risk assessment Diagnosis Source code static analysis Masking Adaptive Attackers Asynchronous logic Symbolic execution Attacks Dynamic-symbolic execution Authentication Architecture de défense Automated test environment Countermeasures Microcontroller IT Automated Test Environments Deep learning Deobfuscation IEEE 1687 WooKey bootloader use-case Cybersécurité Risk analysis Secure Access Physically unclonable function PUF ANALYSE DES RISQUES Multi-Fault Attack Code analysis Artificial Intelligence Fault detection Reliability PQC EMFI Address randomization Malware Adversarial examples Artificial neural network ANN Asymmetric Cryptography Hardware Cybersecurity Side-channel attacks Opaque predicate IoT Industrial systems FPGA Laser Fault Injection GDPR Emulation Simulation Ring oscillator RO Reverse engineering Detection Fault injection attack AES low-cost hardware Access tokens Security and privacy SCADA Micro-architecture Approche par Filtres Fault injection robustness evaluation Asynchronous circuit Clock glitching Machine learning Attack-Tree analysis Safety Approche Filtre Side-channel Allan variance Authorization Encryption