Contact
University of the Aegean
Department of Information and Communication Systems Engineering
Info Sec Lab
Laboratory of Information & Communication Systems Security

Welcome

Welcome to the home page of the "Info-Sec-Lab" Laboratory of Information & Communication Systems Security, Dept. of Information and Communication Systems Engineering, School of Engineering, University of the Aegean, Greece.








I & CT Security Conferences
IWSEC 2018
Submission Deadline: Mar 23, 2018
International Workshop on Security
Sep 3, 2018 - Sep 5, 2018
Sendai, Japan
 
DBSec 2018
Submission Deadline: Mar 30, 2018
32nd IFIP WG 11.3 Conference on Data and Applications Security and Privacy
Jul 16, 2018 - Jul 18, 2018
Bergamo, Italy
 
ISPEC 2018
Submission Deadline: Apr 1, 2018
The 14th International Conference on Information Security Practice and Experience
Sep 25, 2018 - Sep 27, 2018
Tokyo, Japan
 
SDIM 2018
Submission Deadline: Apr 10, 2018
SDIM 2018: The 1st IEEE International Workshop on Secure Digital Identity Management Workshop organizers
Jul 23, 2017 - Jul 27, 2017
Tokyo, Japan
 
FARES 2018
Submission Deadline: Apr 15, 2018
13th International Workshop on Frontiers in Availability, Reliability and Security
Aug 27, 2018 - Aug 30, 2018
Hamburg, Germany
 
Call for Chapters 2018
Submission Deadline: Apr 15, 2018
CFC - Book: Secure Cyber-Physical Systems for Smart Cities (Proposal Submission Deadline: February 28, 2018)
N/A
USA
 
PST 2018
Submission Deadline: Apr 23, 2018
The Sixteen International Conference on Privacy, Security and Trust (PST)
Aug 28, 2018 - Aug 30, 2018
Belfast, United Kingdom
 
IoT-SECFOR 2018
Submission Deadline: Apr 30, 2018
2nd International Workshop on Security and Forensics of IoT
Aug 27, 2018 - Aug 30, 2018
Hamburg, Germany
 
IWSEC 2018
Submission Deadline: Mar 23, 2018
International Workshop on Security
Sep 3, 2018 - Sep 5, 2018
Sendai, Japan
 
DBSec 2018
Submission Deadline: Mar 30, 2018
32nd IFIP WG 11.3 Conference on Data and Applications Security and Privacy
Jul 16, 2018 - Jul 18, 2018
Bergamo, Italy
 
ISPEC 2018
Submission Deadline: Apr 1, 2018
The 14th International Conference on Information Security Practice and Experience
Sep 25, 2018 - Sep 27, 2018
Tokyo, Japan
 
SDIM 2018
Submission Deadline: Apr 10, 2018
SDIM 2018: The 1st IEEE International Workshop on Secure Digital Identity Management Workshop organizers
Jul 23, 2017 - Jul 27, 2017
Tokyo, Japan
 
FARES 2018
Submission Deadline: Apr 15, 2018
13th International Workshop on Frontiers in Availability, Reliability and Security
Aug 27, 2018 - Aug 30, 2018
Hamburg, Germany
 
Call for Chapters 2018
Submission Deadline: Apr 15, 2018
CFC - Book: Secure Cyber-Physical Systems for Smart Cities (Proposal Submission Deadline: February 28, 2018)
N/A
USA
 
PST 2018
Submission Deadline: Apr 23, 2018
The Sixteen International Conference on Privacy, Security and Trust (PST)
Aug 28, 2018 - Aug 30, 2018
Belfast, United Kingdom
 
IoT-SECFOR 2018
Submission Deadline: Apr 30, 2018
2nd International Workshop on Security and Forensics of IoT
Aug 27, 2018 - Aug 30, 2018
Hamburg, Germany
 
SECURWARE 2018
Submission Deadline: Apr 30, 2018
The Twelfth International Conference on Emerging Security Information, Systems and Technologies
Sep 16, 2018 - Sep 20, 2018
Venice, Italy
 
DASC 2018
Submission Deadline: Apr 30, 2018
16th IEEE International Conference on Dependable, Autonomic and Secure Computing
Aug 12, 2018 - Aug 15, 2018
Athens, Greece
 
SciSec 2018
Submission Deadline: May 1, 2018
The 1st International Conference on Science of Cyber Security
Aug 12, 2018 - Aug 14, 2018
Beijing, China
 
IEEE DSC 2018
Submission Deadline: May 12, 2018
The 2018 IEEE Conference on Dependable and Secure Computing
Dec 10, 2018 - Dec 13, 2018
Kaohsiung, Taiwan
 
SPEBD 2018
Submission Deadline: May 15, 2018
Workshop on Security and Privacy-Enhanced Big Data
Aug 27, 2018 - Aug 30, 2018
Hamburg, Germany
 
IWSSS 2018
Submission Deadline: May 21, 2018
6th International Workshop on Systems Safety and Security
Jun 28, 2018 - Jun 30, 2018
Iasi, Romania
 
NordSec 2018
Submission Deadline: Aug 10, 2018
23rd Nordic Conference on Secure IT Systems
Nov 28, 2018 - Nov 30, 2018
Oslo, Norway
 

Members
Faculty Members
Postdoctoral Research Fellows
Postgraduate Research Fellows

Publications
Journals
Conferences
Books
Book Chapters
Conference Proceedings Editing

Research Areas

Our main research interests lie in the areas of:

  • Security and Privacy Economics
  • Secure eCommerce, eBusiness, eGovernment, eHealth
  • Privacy Technologies
  • Development of Secure Information Systems
  • Smart Cards Technologies
  • Security and Privacy Legal and Regulatory issues
  • Forensics Investigation; Internet Telephony Security
  • Wireless and Mobile Communications Security
  • Privacy and Trust in Wireless Sensor Networks
  • Security and Privacy in m-health environments
  • Formal Methods for the Analysis and Design of Cryptographic Protocols

Books (in English)
Digital Privacy: Theory, Technologies, and Practices
Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinoudakis, Sabrina De Capitani di Vimercati (Eds.) Auerbach Publications, Taylor and Francis Group, January 2008

Security and Privacy in Mobile and Wireless Networking
Stefanos Gritzalis, Tom Karygiannis, Charalabos Skianis (Eds.) Troubador Publishing Ltd, February 2009

Intrusion Detection and Prevention for Mobile Ecosystems
Georgios Kambourakis, Asaf Shabtai, Constantinos Kolias, Dimitrios Damopoulos (Eds.), CRC Press, September 2017.


Books (in Greek)
Συγχρονη Κρυπτογραφία - Θεωρία και Εφαρμογές
Mike Burmester - Stefanos Gritzalis - Sokratis Katsikas - Vasileios Chrisikopoulos

Προστασία της Ιδιώτικότητας & Τεχνολογίες Πληροφορικής και Επικοινωνιών
Costas Lambrinoudakis - Lilian Mitrou - Stefanos Gritzalis - Sokratis Katsikas

Ασφάλεια Ασυρμάτων και Κινητών Δικτύων Επικοινωνιών
Georgios Kambourakis - Stefanos Gritzalis - Sokratis Katsikas

Ασφάλεια Δικτύων Υπολογιστών
Stefanos Gritzalis - Sokratis Katsikas - Dimitris Gritzalis

Ασφάλεια Πληροφοριακών Συστημάτων
Sokratis Katsikas - Dimitrios Gritzalis - Stefanos Gritzalis

Projects



News
SonicWall spots Meltdown exploits with machine learning tech
Posted on Feb 16, 2018

News roundup: The Olympic Destroyer malware is more sophisticated than researchers first thought. Plus, Microsoft looks to change identity management with blockchain, and more.

BGP Flaws Patched in Quagga Routing Software
Posted on Feb 16, 2018

The United States, Canada, Australia and New Zealand have joined the United Kingdom in officially blaming Russia for the destructive NotPetya attack launched last summer. Moscow has denied the accusations.

Risk & Repeat: Cryptomining malware on the rise
Posted on Feb 16, 2018

News roundup: The Olympic Destroyer malware is more sophisticated than researchers first thought. Plus, Microsoft looks to change identity management with blockchain, and more.

DoJ breaks up Infraud Organization with some help
Posted on Feb 16, 2018

News roundup: The Olympic Destroyer malware is more sophisticated than researchers first thought. Plus, Microsoft looks to change identity management with blockchain, and more.

U.S., Canada, Australia Attribute NotPetya Attack to Russia
Posted on Feb 16, 2018

A United States Judge this week sent two Russian nationals to prison for their involvement in a hacking scheme that compromised roughly

Intel bug bounty programs widened after Meltdown and Spectre
Posted on Feb 16, 2018

News roundup: The Olympic Destroyer malware is more sophisticated than researchers first thought. Plus, Microsoft looks to change identity management with blockchain, and more.

Critical Broadcom flaws discovered in Lenovo ThinkPads
Posted on Feb 16, 2018

News roundup: The Olympic Destroyer malware is more sophisticated than researchers first thought. Plus, Microsoft looks to change identity management with blockchain, and more.

Cybersecurity insurance breaks coming for Apple, Cisco customers
Posted on Feb 16, 2018

News roundup: The Olympic Destroyer malware is more sophisticated than researchers first thought. Plus, Microsoft looks to change identity management with blockchain, and more.

Apple's confidential iBoot source code leaked online
Posted on Feb 16, 2018

News roundup: The Olympic Destroyer malware is more sophisticated than researchers first thought. Plus, Microsoft looks to change identity management with blockchain, and more.

Oracle WebLogic Server Flaw Exploited to Deliver Crypto-Miners
Posted on Feb 16, 2018

Threat actors are exploiting a recently patched vulnerability in Oracle WebLogic Server to infect systems with crypto-currency mining malware, FireEye reports.&;

Microsoft: Windows Analytics can detect Meltdown and Spectre exposure
Posted on Feb 16, 2018

News roundup: The Olympic Destroyer malware is more sophisticated than researchers first thought. Plus, Microsoft looks to change identity management with blockchain, and more.

WikiLeaks Chat Reportedly Reveals GOP Bias
Posted on Feb 16, 2018

Site wanted party to win last presidential election, according to reported leaks

7,900 Vulnerabilities Didn't Make It into the CVE Database in 2017
Posted on Feb 16, 2018

Last year broke the previous all-time record for the highest number of reported vulnerabilities, with 20,832 of them cataloged.

Malware Spikes Coincided with 2017 Geopolitical Incidents
Posted on Feb 16, 2018

Backdoors are also on the rise for 2018, according to Comodo

Grammarly vulnerability exposed user documents
Posted on Feb 16, 2018

News roundup: The Olympic Destroyer malware is more sophisticated than researchers first thought. Plus, Microsoft looks to change identity management with blockchain, and more.

Oracle to Acquire Cloud Security Firm Zenedge
Posted on Feb 16, 2018

Oracle said Thursday that it has agreed to acquire cloud security firm Zenedge for an undisclosed sum.

View All Sponsored News
Posted on Feb 16, 2018

News roundup: The Olympic Destroyer malware is more sophisticated than researchers first thought. Plus, Microsoft looks to change identity management with blockchain, and more.

Siemens, Airbus and Others Ink Charter on Critical Infrastructure, IoT
Posted on Feb 16, 2018

The nine-member group outlines 10 action areas, and it has agreed to pioneer independent certification for infrastructure.

Olympic Destroyer malware more complex than first thought
Posted on Feb 16, 2018

News roundup: The Olympic Destroyer malware is more sophisticated than researchers first thought. Plus, Microsoft looks to change identity management with blockchain, and more.

FedEx S3 Bucket Exposes Private Details on Thousands Worldwide
Posted on Feb 15, 2018

It contained more than 119,000 scanned documents, including passports, drivers’ licenses, names, home addresses, phone numbers and ZIP codes.


University of the Aegean | Greece

School of Engineering | Information and Communication Systems Engineering

Karlovassi, Samos, 83200, Greece

Email : info-sec-lab@aegean.gr | Fax : +30-22730-82009

ICSD 2008-2017