The Grenoble Alpes Cybersecurity Institute aims at undertaking ground-breaking interdisciplinary research in order to address cybersecurity and privacy challenges. Our main technical focus is on low-cost secure elements, critical infrastructures, vulnerability analysis and validation of large systems, including practical resilience across the industry and the society. Our approach to cybersecurity is holistic, encompassing technical, legal, law-enforcement, economic, social, diplomatic, military and intelligence-related aspects with strong partnerships with the private sector and robust national and international cooperation with leading institutions in France and abroad.

 Instructions to authors

Please don't forget  to mention the following in your articles:

"Ce travail a bénéficié d'une aide de l'Etat gérée par l'Agence Nationale de la Recherche au titre du programme "Investissements d'avenir" portant la référence ANR-15-IDEX-02"

or

"This work is supported by the French National Research Agency in the framework of the "Investissements d’avenir” program (ANR-15-IDEX-02)"

 

Last publications

 

 

 

Key words

Allan variance Fault injection attacks Fault model Machine learning Code analysis Anonymisation Variable-length instruction set SCADA Security Cyber-attacks Card-based secure two-party protocols OT ICS Symbolic execution IEEE 1687 Micro-architecture Reliability Adaptive Attackers Fault injection robustness evaluation Hardware security Fault detection ASCON Hardware performance counters AES low-cost hardware Resilience Obfuscation Ring oscillator RO Zero-knowledge proofs Countermeasures Automated Test Environments Fault attacks Secure access Attacks Deep learning Formal methods GDPR Approche Filtre Malware Opaque predicate Industrial systems Fault injection attack Dynamic-symbolic execution Système de contrôle-commande industriel Cybersecurity PQC Source code static analysis Side-channel ADCs X-Ray Artificial Neural Network IT Architecture de défense Authorization Detection Encoding AEAD Approche par Filtres Microarchitecture Simulation Adversarial examples Puzzle Artificial neural network ANN Safety Emulation EMFI Adversarial perturbation Fault injection Side-channel attacks Encryption Security and privacy Privacy FPGA Physically unclonable function PUF Automated test environment Mutual information Cybersécurité Secure Access Re-identification Adapted modular number system Access tokens Clock glitching Aging Diagnosis Risk analysis Masking Authentication Risk assessment Deobfuscation Artificial Intelligence Address randomization Reverse engineering AI IoT Asset pricing ANALYSE DES RISQUES Accès sécurisé WooKey bootloader use-case Multiple fault-injection Blockchain Hardware