index - Archive ouverte HAL Access content directly

The Grenoble Alpes Cybersecurity Institute aims at undertaking ground-breaking interdisciplinary research in order to address cybersecurity and privacy challenges. Our main technical focus is on low-cost secure elements, critical infrastructures, vulnerability analysis and validation of large systems, including practical resilience across the industry and the society. Our approach to cybersecurity is holistic, encompassing technical, legal, law-enforcement, economic, social, diplomatic, military and intelligence-related aspects with strong partnerships with the private sector and robust national and international cooperation with leading institutions in France and abroad.


Instructions to authors

Please don't forget  to mention the following in your articles:

"Ce travail a bénéficié d'une aide de l'Etat gérée par l'Agence Nationale de la Recherche au titre du programme "Investissements d'avenir" portant la référence ANR-15-IDEX-02"


"This work is supported by the French National Research Agency in the framework of the "Investissements d’avenir” program (ANR-15-IDEX-02)"



Last publications




Key words

Flow integrity Cybersécurité CADP DES Discrete event system Reverse engineering Formal verification Asynchronous logic Critical states distance Distance Symbolic execution Automated reasoning Concurrency Blockchain FD-SOI Authenticated encryption with associated data AES low-cost hardware Cyber Sécurité Authentication CMOS bulk Behavioral Model SCADA Filtre CMOS Bulk Computer-aided design Cyber Attacks Cyber-security Cyber-attacks FDSOI Cyberattacks Cybersecurity Ensemble learning Due diligence Automates programmables Obfuscation EM First-order logic Critical state distance Système de contrôle-commande industriel Discrete event systems Machine learning Cyber Physical Systems Authorization Compilation Filter Approach Execute In Place Counterfeit BBICS Countermeasures Communication security Conspiracy Santa Behavioral based-IDS Cyber Attaque Asynchronous circuit Data protection DFA Puzzle Cyber security Diagnosis ANALYSE DES RISQUES Distance aux états critiques Privacy CYBERSÉCURITÉ Cybersécurité des systèmes industriels Cyber Laser fault injection Filter approach Cyberspace Functional safety Combinational constraints Diagnostic Attack-Tree analysis Digitalization Differential Fault Analysis Industrial systems Détection Finger- prints Control and security for critical infrastructure systems AEAD Approche Filtre Fault detection Compétition Architecture de défense Opaque predicate Fault injection Automated verification Access tokens Discrete Event System Card-based secure two-party protocols Asynchronous design Cryptocurrency Cyber Security Bow-Tie analysis Enseignement Zero-knowledge proofs Code cloning Deobfuscation Control-flow graph Clocks Approche par Filtres