Skip to Main content Skip to Navigation

The Grenoble Alpes Cybersecurity Institute aims at undertaking ground-breaking interdisciplinary research in order to address cybersecurity and privacy challenges. Our main technical focus is on low-cost secure elements, critical infrastructures, vulnerability analysis and validation of large systems, including practical resilience across the industry and the society. Our approach to cybersecurity is holistic, encompassing technical, legal, law-enforcement, economic, social, diplomatic, military and intelligence-related aspects with strong partnerships with the private sector and robust national and international cooperation with leading institutions in France and abroad.


Instructions to authors

Please don't forget  to mention the following in your articles:

"Ce travail a bénéficié d'une aide de l'Etat gérée par l'Agence Nationale de la Recherche au titre du programme "Investissements d'avenir" portant la référence ANR-15-IDEX-02"


"This work is supported by the French National Research Agency in the framework of the "Investissements d’avenir” program (ANR-15-IDEX-02)"



Last publications




Key words

Diagnosis Automated reasoning EM Flow integrity Differential Fault Analysis Blockchain Code cloning Cyberattacks Cyberspace Distance aux états critiques Behavioral Model Cyber Physical Systems Card-based secure two-party protocols Privacy Discrete event systems Cyber-attacks Conspiracy Santa ANALYSE DES RISQUES Asynchronous logic Functional safety Filter approach Deobfuscation AEAD Authentication Computer-aided design BBICS Ensemble learning Finger- prints Cybersécurité DES Authenticated encryption with associated data GDPR DFA Industrial systems Cryptocurrency Distance Critical states distance Discrete event system Architecture de défense Obfuscation Cyber security Cyber Sécurité Détection Discrete Event System Fault injection Zero-knowledge proofs Authorization Cyber Attacks Control-flow graph Counterfeit Reverse engineering Due diligence First-order logic Fault detection CYBERSÉCURITÉ Filter Approach Communication security CADP Bow-Tie analysis FDSOI Countermeasures Asynchronous design Automated verification Cybersecurity Cyber Attaque Cybersécurité des systèmes industriels Behavioral based-IDS Approche par Filtres Data protection Approche Filtre CMOS Bulk FD-SOI Symbolic execution Opaque predicate Access tokens Asynchronous circuit Control and security for critical infrastructure systems Compilation Système de contrôle-commande industriel Laser fault injection Group key distribution Puzzle Combinational constraints AES low-cost hardware Execute In Place Formal verification Filtre Machine learning Concurrency Cyber Security Cyber-security Cyber Automates programmables Clocks CMOS bulk SCADA Critical state distance Digitalization Attack-Tree analysis Diagnostic