Contact
University of the Aegean
Department of Information and Communication Systems Engineering
Info Sec Lab
Laboratory of Information & Communication Systems Security

Welcome

Welcome to the home page of the "Info-Sec-Lab" Laboratory of Information & Communication Systems Security, Dept. of Information and Communication Systems Engineering, School of Engineering, University of the Aegean, Greece.




I & CT Security Conferences
ICCSP--ACM, Ei and Scopus 2019
Submission Deadline: Nov 20, 2018
ACM--2019 the 3rd International Conference on Cryptography, Security and Privacy (ICCSP 2019)--Ei Compendex and Scopus
Jan 19, 2019 - Jan 21, 2019
Kuala Lumpur, Malaysia
 
SPNCE 2019
Submission Deadline: Nov 30, 2018
2nd EAI International Conference on Security and Privacy in New Computing Environments
Apr 13, 2019 - Apr 14, 2019
Tianjin, People's Republic of China
 
C2SI 2019
Submission Deadline: Nov 30, 2018
3rd International Conference on Codes, Cryptology and Information Security
Apr 22, 2019 - Apr 24, 2019
Mohammed V University in Rabat
 
COSADE 2019
Submission Deadline: Dec 1, 2018
Constructive Side-Channel Analysis and Secure Design
Apr 3, 2019 - Apr 5, 2019
Darmstadt, Germany
 
IEEE S&P 2019
Submission Deadline: Dec 1, 2018
IEEE Symposium on Security and Privacy
May 20, 2019 - May 22, 2019
San Francisco, CA
 
IEEE 5G-Security 2019
Submission Deadline: Dec 8, 2018
The 2019 IEEE Workshop on 5G Wireless Security with IEEE ICC 2019
May 20, 2019 - May 24, 2019
Shanghai, China
 
IoTBDS 2019
Submission Deadline: Dec 10, 2018
3rd International Conference on Internet of Things, Big Data and Security
May 2, 2019 - May 4, 2019
Heraklion, Crete, Greece
 
DISSECT 2019
Submission Deadline: Dec 15, 2018
IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (DISSECT)
Apr 8, 2019 - Apr 8, 2019
Washington D.C., USA
 
IWSPA 2019
Submission Deadline: Dec 15, 2018
International Workshop on Security and Privacy Analytics
Mar 27, 2019 - Mar 27, 2019
Dallas, TX
 
APF 2019
Submission Deadline: Jan 11, 2019
Annual Privacy Forum
Jun 13, 2019 - Jun 14, 2019
Rome, Italy
 
ICCSP--ACM, Ei and Scopus 2019
Submission Deadline: Nov 20, 2018
ACM--2019 the 3rd International Conference on Cryptography, Security and Privacy (ICCSP 2019)--Ei Compendex and Scopus
Jan 19, 2019 - Jan 21, 2019
Kuala Lumpur, Malaysia
 
SPNCE 2019
Submission Deadline: Nov 30, 2018
2nd EAI International Conference on Security and Privacy in New Computing Environments
Apr 13, 2019 - Apr 14, 2019
Tianjin, People's Republic of China
 
C2SI 2019
Submission Deadline: Nov 30, 2018
3rd International Conference on Codes, Cryptology and Information Security
Apr 22, 2019 - Apr 24, 2019
Mohammed V University in Rabat
 
COSADE 2019
Submission Deadline: Dec 1, 2018
Constructive Side-Channel Analysis and Secure Design
Apr 3, 2019 - Apr 5, 2019
Darmstadt, Germany
 
IEEE S&P 2019
Submission Deadline: Dec 1, 2018
IEEE Symposium on Security and Privacy
May 20, 2019 - May 22, 2019
San Francisco, CA
 
IEEE 5G-Security 2019
Submission Deadline: Dec 8, 2018
The 2019 IEEE Workshop on 5G Wireless Security with IEEE ICC 2019
May 20, 2019 - May 24, 2019
Shanghai, China
 
IoTBDS 2019
Submission Deadline: Dec 10, 2018
3rd International Conference on Internet of Things, Big Data and Security
May 2, 2019 - May 4, 2019
Heraklion, Crete, Greece
 
DISSECT 2019
Submission Deadline: Dec 15, 2018
IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (DISSECT)
Apr 8, 2019 - Apr 8, 2019
Washington D.C., USA
 
IWSPA 2019
Submission Deadline: Dec 15, 2018
International Workshop on Security and Privacy Analytics
Mar 27, 2019 - Mar 27, 2019
Dallas, TX
 
APF 2019
Submission Deadline: Jan 11, 2019
Annual Privacy Forum
Jun 13, 2019 - Jun 14, 2019
Rome, Italy
 
5G-NET-SEC 2019
Submission Deadline: Jan 15, 2019
Future Generation Computer Systems (IF=4.639) Special Issue on Advancements in 5G Networks Security
N/A
N/A
 
ACNS 2019
Submission Deadline: Jan 22, 2019
International Conference on Applied Cryptography and Network Security
Jun 5, 2019 - Jun 7, 2019
Bogotá, Colombia
 
ACISP 2019
Submission Deadline: Feb 15, 2019
The 24th Australasian Conference on Information Security and Privacy
Jul 3, 2019 - Jul 5, 2019
Christchurch, New Zealnad
 
MDPI Information 2019
Submission Deadline: Feb 28, 2019
MDPI OA Journal of Information Science, Technology and Engineering --SI on Machine Learning for Cyber-Security
N/A
N/A
 
DBSEC 2019
Submission Deadline: Mar 1, 2019
33rd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy
Jul 15, 2019 - Jul 17, 2019
Charleston, SC, USA.
 
ETRIJ Cyber Security & AI 2019
Submission Deadline: Mar 28, 2019
ETRI Journal Special issue on Cyber Security and AI
N/A
N/A
 

Members
Faculty Members
Postdoctoral Research Fellows
Postgraduate Research Fellows

Publications
Journals
Conferences
Books
Book Chapters
Conference Proceedings Editing

Research Areas

Our main research interests lie in the areas of:

  • Security and Privacy Economics
  • Secure eCommerce, eBusiness, eGovernment, eHealth
  • Privacy Technologies
  • Development of Secure Information Systems
  • Smart Cards Technologies
  • Security and Privacy Legal and Regulatory issues
  • Forensics Investigation; Internet Telephony Security
  • Wireless and Mobile Communications Security
  • Privacy and Trust in Wireless Sensor Networks
  • Security and Privacy in m-health environments
  • Formal Methods for the Analysis and Design of Cryptographic Protocols

Books (in English)
Digital Privacy: Theory, Technologies, and Practices
Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinoudakis, Sabrina De Capitani di Vimercati (Eds.) Auerbach Publications, Taylor and Francis Group, January 2008

Security and Privacy in Mobile and Wireless Networking
Stefanos Gritzalis, Tom Karygiannis, Charalabos Skianis (Eds.) Troubador Publishing Ltd, February 2009

Intrusion Detection and Prevention for Mobile Ecosystems
Georgios Kambourakis, Asaf Shabtai, Constantinos Kolias, Dimitrios Damopoulos (Eds.), CRC Press, September 2017.


Books (in Greek)
Συγχρονη Κρυπτογραφία - Θεωρία και Εφαρμογές
Mike Burmester - Stefanos Gritzalis - Sokratis Katsikas - Vasileios Chrisikopoulos

Προστασία της Ιδιώτικότητας & Τεχνολογίες Πληροφορικής και Επικοινωνιών
Costas Lambrinoudakis - Lilian Mitrou - Stefanos Gritzalis - Sokratis Katsikas

Ασφάλεια Ασυρμάτων και Κινητών Δικτύων Επικοινωνιών
Georgios Kambourakis - Stefanos Gritzalis - Sokratis Katsikas

Ασφάλεια Δικτύων Υπολογιστών
Stefanos Gritzalis - Sokratis Katsikas - Dimitris Gritzalis

Ασφάλεια Πληροφοριακών Συστημάτων
Sokratis Katsikas - Dimitrios Gritzalis - Stefanos Gritzalis

Projects



News
Endpoint Attacks Increase as Patching Slows
Posted on Oct 16, 2018

Endpoint compromises up 20% from last year, finds Ponemon survey.

Feds Investigate After Hackers Attack Water Utility
Posted on Oct 16, 2018

Federal and state officials are working with a North Carolina water utility after hackers attacked some of its computer systems.

#Cyberrecoded: Get the Certification that is Right for You
Posted on Oct 16, 2018

The need to understand what certification is most suited for a person

UK Launches “World First” IoT Code of Practice
Posted on Oct 16, 2018

Experts caution it doesn’t go far enough

Attack Vectors Long Quiet Make Loud Q3 Comeback
Posted on Oct 15, 2018

Cyber-criminals breathe new life into old tactics and techniques, says Malwarebytes.

New IBM Security Platform Connects Data, Tools From Several Vendors
Posted on Oct 15, 2018

IBM Security on Monday unveiled a new cloud-based platform that combines the company's own capabilities with data, applications and tools from more than a dozen other vendors.

Octopus Targets Central Asian Diplomats
Posted on Oct 15, 2018

Malicious program for Windows gives attackers remote access, says Kaspersky Lab.

Branch.io Flaws Exposed Tinder, Shopify, Yelp Users to XSS Attacks
Posted on Oct 15, 2018

Hundreds of millions of users may have been exposed to cross-site scripting (XSS) attacks due to a vulnerability present in Branch.io, a service used by Tinder, Shopify, Yelp and many others.

WannaCry Cost NHS £92 Million
Posted on Oct 15, 2018

Ransomware costs hit home for under-funded health service

iPhone a Growing Target of Crypto-Mining Attacks
Posted on Oct 15, 2018

Coinhive attacks Apple iPhone and Safari browser, says Check Point

Microsoft Incompletely Patches JET Database Vulnerability
Posted on Oct 15, 2018

An out-of-bounds (OOB) write bug in the Microsoft JET Database Engine that could be exploited for remote code execution has been incompletely addressed with the latest

Web Isolation Firm Garrison Technologies Raises $30 Million
Posted on Oct 15, 2018

London, UK-based

Google Boosts Protection of Backups in Android
Posted on Oct 15, 2018

The latest Android iteration leverages Google Cloud’s Titan technology to better protect users’ backed-up application data, Google says.

FDA Warns of Flaws in Medtronic Programmers
Posted on Oct 15, 2018

A vulnerability in the software update process of certain Medtronic Programmer models has determined the vendor to block the functionality on affected devices, the U.S. Food and Drug Administration (FDA) informs.

Collection Strategies: The Key Differentiator Among Threat Intelligence Vendors
Posted on Oct 15, 2018

The outcome of an intelligence operation depends largely on the data that fuels it. Even the most sophisticated operation will fail to produce intelligence of value of its data is not also of value. This concept highlights the biggest differentiator and most important factor to consider when choosing a threat intelligence vendor: data source coverage and, more specifically, collection strategy.

Facebook Breach Hit 30 Million
Posted on Oct 15, 2018

Some 14m had virtually all their profile info scraped

Pentagon Staff Hit by Major Data Breach
Posted on Oct 15, 2018

Financial and personal information may have been exposed by contractor

Tech Giants Concerned About Australia's Encryption Laws
Posted on Oct 15, 2018

Cyber law changes proposed in Australia specifically state that companies will not be required to implement encryption backdoors, but tech giants are still concerned that the current form of the legislation is too vague and leaves a lot of room for interpretation.

How to Check What Facebook Hackers Accessed in Your Account
Posted on Oct 13, 2018

Could hackers have been able to see the last person you cyberstalked, or that party photo you were tagged in? According to Facebook, the unfortunate answer is "yes."

Industry Reactions to Google+ Security Incident: Feedback Friday
Posted on Oct 12, 2018

Although the U.S. Congress must have designated literally thousands of commemorative days, weeks and months, I’m a bit partial to this month’s designation, National Cybersecurity Awareness month, now in its 15th year. Although I tend to think quite a bit on this topic during the other 11 months as well, it does make me pause to reflect on how cybersecurity awareness has evolved over this time period, and contrast that with the evolution of cybersecurity effectiveness.&;


University of the Aegean | Greece

School of Engineering | Information and Communication Systems Engineering

Karlovassi, Samos, 83200, Greece

Email : info-sec-lab@aegean.gr | Fax : +30-22730-82009

ICSD 2008-2018