index - Grenoble Alpes Cybersecurity Institute Access content directly

The Grenoble Alpes Cybersecurity Institute aims at undertaking ground-breaking interdisciplinary research in order to address cybersecurity and privacy challenges. Our main technical focus is on low-cost secure elements, critical infrastructures, vulnerability analysis and validation of large systems, including practical resilience across the industry and the society. Our approach to cybersecurity is holistic, encompassing technical, legal, law-enforcement, economic, social, diplomatic, military and intelligence-related aspects with strong partnerships with the private sector and robust national and international cooperation with leading institutions in France and abroad.

 

Instructions to authors

Please don't forget  to mention the following in your articles:

"Ce travail a bénéficié d'une aide de l'Etat gérée par l'Agence Nationale de la Recherche au titre du programme "Investissements d'avenir" portant la référence ANR-15-IDEX-02"

or

"This work is supported by the French National Research Agency in the framework of the "Investissements d’avenir” program (ANR-15-IDEX-02)"

 

 

Last publications

 

 

 

Key words

Attack-Tree analysis Architecture de défense FPGA Multi-Fault Attack Ring oscillator RO Hardware security WooKey bootloader use-case Access tokens OT Micro-architecture Asynchronous circuit Aging PQC Fault injection attack Machine learning Asynchronous logic Mutual information Privacy ASCON Accès sécurisé Deobfuscation IT Secure access Laser Fault Injection Allan variance Fault injection Industrial systems Automated Test Environments Fault attacks Symbolic execution Attacks Clock glitching Puzzle Reverse engineering Multiple fault-injection Encoding Card-based secure two-party protocols Emulation Masking Hardware performance counters Fault Injection Simulation Simulation Approche par Filtres Encryption Asynchronous design EMFI ICS Authorization Asymmetric Cryptography Secure Access Risk analysis Automated test environment Hardware Microarchitecture Microcontroller Artificial Intelligence Detection GDPR ADCs Physically unclonable function PUF Adaptive Attackers Fault detection ANALYSE DES RISQUES Fault model Obfuscation Fault injection robustness evaluation Adversarial examples Cybersécurité AEAD Artificial neural network ANN Formal methods Cybersecurity Countermeasures IoT SCADA Approche Filtre Deep learning IEEE 1687 Anonymisation Risk assessment Adversarial perturbation Side-channel attacks Security and privacy Source code static analysis Diagnosis Address randomization AES low-cost hardware Authentication Malware Opaque predicate Code analysis Artificial Neural Network Reliability Side-channel X-Ray Security Zero-knowledge proofs Dynamic-symbolic execution Safety Système de contrôle-commande industriel