index - Grenoble Alpes Cybersecurity Institute Access content directly

The Grenoble Alpes Cybersecurity Institute aims at undertaking ground-breaking interdisciplinary research in order to address cybersecurity and privacy challenges. Our main technical focus is on low-cost secure elements, critical infrastructures, vulnerability analysis and validation of large systems, including practical resilience across the industry and the society. Our approach to cybersecurity is holistic, encompassing technical, legal, law-enforcement, economic, social, diplomatic, military and intelligence-related aspects with strong partnerships with the private sector and robust national and international cooperation with leading institutions in France and abroad.

 

Instructions to authors

Please don't forget  to mention the following in your articles:

"Ce travail a bénéficié d'une aide de l'Etat gérée par l'Agence Nationale de la Recherche au titre du programme "Investissements d'avenir" portant la référence ANR-15-IDEX-02"

or

"This work is supported by the French National Research Agency in the framework of the "Investissements d’avenir” program (ANR-15-IDEX-02)"

 

 

Last publications

 

 

 

Key words

Asynchronous design Reliability Ciphers Card-based secure two-party protocols Masking Opaque predicate Behavioral based-IDS Cache side-channel attacks SCADA AEAD Access tokens Callbacks Aging Architecture de défense Hardware security Clock glitching Security Hardware performance counters IEEE 1687 ASCON Simulation Emulation Automated reasoning OT Fault model Diagnosis Fault detection Clocks Deobfuscation Authentication Address randomization Symbolic execution Approche par Filtres Cybersécurité Microarchitecture Detection Countermeasures Système de contrôle-commande industriel Authorization Risk analysis Attack-Tree analysis Bow-Tie analysis Asynchronous circuit BBICS Chosen Ciphertext Attack Clock glitch Behavioral Model Authenticated encryption with associated data PQC AES low-cost hardware Zero-knowledge proofs IT Obfuscation Mutual information Asymmetric Cryptography Reverse engineering ADCs Accès sécurisé Fault attacks Privacy Approche Filtre Cheese microbial ecology CMOS Bulk Safety Machine learning Encryption ICS FPGA CMOS bulk Malware Blockchain Circuit-aging Cybersecurity Allan variance CADP BIST Code cloning Artificial Neural Network Automated Test Environments Micro-architecture Deep learning Secure Access Automated verification Certification Fault injection Clock glitch fault injection Fault injection attack IoT Circuit Aging Industrial systems CYBERSÉCURITÉ Attacks Risk assessment Laser fault injection ANALYSE DES RISQUES Automated test environment Secure access Puzzle Automates programmables Asynchronous logic