index - Grenoble Alpes Cybersecurity Institute Access content directly

The Grenoble Alpes Cybersecurity Institute aims at undertaking ground-breaking interdisciplinary research in order to address cybersecurity and privacy challenges. Our main technical focus is on low-cost secure elements, critical infrastructures, vulnerability analysis and validation of large systems, including practical resilience across the industry and the society. Our approach to cybersecurity is holistic, encompassing technical, legal, law-enforcement, economic, social, diplomatic, military and intelligence-related aspects with strong partnerships with the private sector and robust national and international cooperation with leading institutions in France and abroad.

 

Instructions to authors

Please don't forget  to mention the following in your articles:

"Ce travail a bénéficié d'une aide de l'Etat gérée par l'Agence Nationale de la Recherche au titre du programme "Investissements d'avenir" portant la référence ANR-15-IDEX-02"

or

"This work is supported by the French National Research Agency in the framework of the "Investissements d’avenir” program (ANR-15-IDEX-02)"

 

 

Last publications

 

 

 

Key words

ADCs FPGA Clock glitching Asymmetric Cryptography Artificial Intelligence Fault injection attack Zero-knowledge proofs Asynchronous logic PQC Allan variance Hardware performance counters IEEE 1687 Malware Risk analysis Multiple fault-injection Aging Attack-Tree analysis Architecture de défense AES low-cost hardware Address randomization Fault detection Automated test environment Encoding Deobfuscation Artificial Neural Network Reliability ASCON Authorization Fault injection Industrial systems Attacks Opaque predicate AEAD Deep learning Simulation SCADA Safety Diagnosis Encryption Side-channel attacks Asynchronous design Artificial neural network ANN Machine learning Puzzle Side-channel Accès sécurisé Reverse engineering Hardware security Code analysis Security and privacy Access tokens Cybersécurité Fault Injection Simulation Card-based secure two-party protocols Emulation WooKey bootloader use-case Privacy Source code static analysis Approche Filtre OT EMFI IoT Adversarial perturbation X-Ray Dynamic-symbolic execution Ring oscillator RO Countermeasures Adaptive Attackers Micro-architecture Automated Test Environments Adversarial examples Security Mutual information Fault model Secure Access Hardware Anonymisation Obfuscation Detection ICS ANALYSE DES RISQUES Asynchronous circuit Système de contrôle-commande industriel Fault injection robustness evaluation Approche par Filtres Multi-Fault Attack Fault attacks Laser Fault Injection Secure access GDPR Symbolic execution Microarchitecture Authentication Microcontroller Masking Physically unclonable function PUF IT Cybersecurity Risk assessment Formal methods