Skip to Main content Skip to Navigation

The Grenoble Alpes Cybersecurity Institute aims at undertaking ground-breaking interdisciplinary research in order to address cybersecurity and privacy challenges. Our main technical focus is on low-cost secure elements, critical infrastructures, vulnerability analysis and validation of large systems, including practical resilience across the industry and the society. Our approach to cybersecurity is holistic, encompassing technical, legal, law-enforcement, economic, social, diplomatic, military and intelligence-related aspects with strong partnerships with the private sector and robust national and international cooperation with leading institutions in France and abroad.

 

Instructions to authors

Please don't forget  to mention the following in your articles:

"Ce travail a bénéficié d'une aide de l'Etat gérée par l'Agence Nationale de la Recherche au titre du programme "Investissements d'avenir" portant la référence ANR-15-IDEX-02"

or

"This work is supported by the French National Research Agency in the framework of the "Investissements d’avenir” program (ANR-15-IDEX-02)"

 

 

Last publications

 

 

 

Key words

CMOS Bulk BBICS Authentication Cyber Physical Systems Blockchain Cybersécurité Attack-Tree analysis Clocks Machine learning Diagnosis Cyber-attacks AEAD First-order logic Zero-knowledge proofs Authenticated encryption with associated data Code cloning Behavioral Model Discrete Event System DFA CYBERSÉCURITÉ Computer-aided design Asynchronous design Critical states distance Compilation Execute In Place Group key distribution Cyber Attaque Combinational constraints Differential Fault Analysis FD-SOI Cybersecurity Asynchronous circuit Ensemble learning Asynchronous logic ANALYSE DES RISQUES Détection CMOS bulk Filter approach Automates programmables Architecture de défense Control-flow graph Control and security for critical infrastructure systems Flow integrity Discrete event system CADP Functional safety Cyber Cyberspace Diagnostic Digitalization Data protection Due diligence Automated reasoning SCADA Deobfuscation Communication security Puzzle Behavioral based-IDS Conspiracy Santa Distance aux états critiques Concurrency Authorization Industrial systems Cyber-security Approche par Filtres Laser fault injection Card-based secure two-party protocols GDPR Distance FDSOI Système de contrôle-commande industriel Symbolic execution Fault injection AES low-cost hardware Bow-Tie analysis Countermeasures Access tokens Obfuscation Cryptocurrency Cyber Attacks Formal verification Approche Filtre Fault detection Cyber Security Cyberattacks Automated verification EM Discrete event systems DES Cyber Sécurité Privacy Filter Approach Cybersécurité des systèmes industriels Finger- prints Cyber security Critical state distance Filtre Reverse engineering Counterfeit Opaque predicate