index - Grenoble Alpes Cybersecurity Institute Access content directly

The Grenoble Alpes Cybersecurity Institute aims at undertaking ground-breaking interdisciplinary research in order to address cybersecurity and privacy challenges. Our main technical focus is on low-cost secure elements, critical infrastructures, vulnerability analysis and validation of large systems, including practical resilience across the industry and the society. Our approach to cybersecurity is holistic, encompassing technical, legal, law-enforcement, economic, social, diplomatic, military and intelligence-related aspects with strong partnerships with the private sector and robust national and international cooperation with leading institutions in France and abroad.

 Instructions to authors

Please don't forget  to mention the following in your articles:

"Ce travail a bénéficié d'une aide de l'Etat gérée par l'Agence Nationale de la Recherche au titre du programme "Investissements d'avenir" portant la référence ANR-15-IDEX-02"

or

"This work is supported by the French National Research Agency in the framework of the "Investissements d’avenir” program (ANR-15-IDEX-02)"

 

Last publications

 

 

 

Key words

Card-based secure two-party protocols Laser Fault Injection Physically unclonable function PUF Adversarial perturbation Simulation Microarchitecture ASCON Emulation Reliability Safety Symbolic execution Fault attacks Encoding Clock glitching Privacy Hardware Mutual information Accès sécurisé Allan variance Fault model Hardware performance counters Risk analysis Secure Access Asynchronous logic Cybersécurité Access tokens Artificial Neural Network Source code static analysis Cybersecurity PQC Opaque predicate Deobfuscation Machine learning Fault injection Obfuscation Asymmetric Cryptography Address randomization Microcontroller Fault Injection Simulation Attacks Artificial neural network ANN Architecture de défense AES low-cost hardware Diagnosis ADCs Fault injection attack Detection Deep learning Security Malware GDPR Encryption Artificial Intelligence AEAD Authentication Side-channel IT EMFI Risk assessment Automated Test Environments Attack-Tree analysis Fault detection ICS Asynchronous design Approche Filtre OT Multiple fault-injection ANALYSE DES RISQUES Side-channel attacks Système de contrôle-commande industriel Hardware security SCADA Asynchronous circuit IoT Ring oscillator RO Adversarial examples Industrial systems Zero-knowledge proofs FPGA Anonymisation Formal methods Countermeasures Automated test environment Dynamic-symbolic execution Masking X-Ray Micro-architecture Puzzle Secure access Adaptive Attackers Authorization Multi-Fault Attack WooKey bootloader use-case IEEE 1687 Aging Code analysis Fault injection robustness evaluation Security and privacy Reverse engineering Approche par Filtres