Contact
University of the Aegean
Department of Information and Communication Systems Engineering
Info Sec Lab
Laboratory of Information & Communication Systems Security

Welcome

Welcome to the home page of the "Info-Sec-Lab" Laboratory of Information & Communication Systems Security, Dept. of Information and Communication Systems Engineering, School of Engineering, University of the Aegean, Greece.








I & CT Security Conferences
CASCCIT 2018
Submission Deadline: Jul 27, 2018
On Context-Aware Security in Cloud Computing and Internet of Things 2018
N/A
N/A
 
CASCCIT 2018
Submission Deadline: Jul 27, 2018
On Context-Aware Security in Cloud Computing and Internet of Things 2018
N/A
N/A
 
WCMC-IoT 2018
Submission Deadline: Jul 27, 2018
WCMC journal, Special issue on Security, Privacy, and Trust on Internet of Things
N/A
N/A
 
SPIoT 2018
Submission Deadline: Jul 30, 2018
The 7th International Symposium on Security and Privacy on Internet of Things
Dec 11, 2018 - Dec 13, 2018
Melbourne, Australia
 
Journal of Computer Networks 2018
Submission Deadline: Aug 6, 2018
Special Issue: Security and Privacy for the Internet of Things, Elsevier Journal of Computer Networks
Dec 1, 2018 - Dec 2, 2018
Journal
 
NDSS 2019
Submission Deadline: Aug 7, 2018
Network and Distributed System Security Symposium
Feb 24, 2019 - Feb 27, 2019
San Diego, CA
 
ADMiS 2018
Submission Deadline: Aug 7, 2018
International Workshop on Adapting Data Mining for Security 2018
Nov 20, 2018 - Nov 20, 2018
Singapore
 
ICCWS 2019
Submission Deadline: Aug 9, 2018
14th International Conference on Cyber Warfare and Security
Feb 28, 2019 - Mar 1, 2019
Stellenbosch, South Africa
 
NordSec 2018
Submission Deadline: Aug 10, 2018
23rd Nordic Conference on Secure IT Systems
Nov 28, 2018 - Nov 30, 2018
Oslo, Norway
 
CASCCIT 2018
Submission Deadline: Jul 27, 2018
On Context-Aware Security in Cloud Computing and Internet of Things 2018
N/A
N/A
 
CASCCIT 2018
Submission Deadline: Jul 27, 2018
On Context-Aware Security in Cloud Computing and Internet of Things 2018
N/A
N/A
 
WCMC-IoT 2018
Submission Deadline: Jul 27, 2018
WCMC journal, Special issue on Security, Privacy, and Trust on Internet of Things
N/A
N/A
 
SPIoT 2018
Submission Deadline: Jul 30, 2018
The 7th International Symposium on Security and Privacy on Internet of Things
Dec 11, 2018 - Dec 13, 2018
Melbourne, Australia
 
Journal of Computer Networks 2018
Submission Deadline: Aug 6, 2018
Special Issue: Security and Privacy for the Internet of Things, Elsevier Journal of Computer Networks
Dec 1, 2018 - Dec 2, 2018
Journal
 
NDSS 2019
Submission Deadline: Aug 7, 2018
Network and Distributed System Security Symposium
Feb 24, 2019 - Feb 27, 2019
San Diego, CA
 
ADMiS 2018
Submission Deadline: Aug 7, 2018
International Workshop on Adapting Data Mining for Security 2018
Nov 20, 2018 - Nov 20, 2018
Singapore
 
ICCWS 2019
Submission Deadline: Aug 9, 2018
14th International Conference on Cyber Warfare and Security
Feb 28, 2019 - Mar 1, 2019
Stellenbosch, South Africa
 
NordSec 2018
Submission Deadline: Aug 10, 2018
23rd Nordic Conference on Secure IT Systems
Nov 28, 2018 - Nov 30, 2018
Oslo, Norway
 
WICS 2018
Submission Deadline: Aug 15, 2018
5th International Workshop on Information and Communication Security
Nov 27, 2018 - Nov 30, 2018
Hida Takayama, Japan
 
SI-IoT-SECFOR 2018
Submission Deadline: Aug 15, 2018
Special Issue on Security and Forensics of Internet-of-Things: Problems and Solutions
May 8, 2018 - Apr 1, 2019
NA
 
SN 2018
Submission Deadline: Aug 28, 2018
Fifth IEEE International Workshop on Security in NFV-SDN
Nov 27, 2018 - Nov 29, 2018
Verona, Italy
 
SN 2018
Submission Deadline: Aug 28, 2018
Fifth IEEE International Workshop on Security in NFV-SDN
Nov 27, 2018 - Nov 29, 2018
Verona, Italy
 
IGK 2018
Submission Deadline: Aug 31, 2018
Istanbul Security Conference 2018
Nov 7, 2018 - Nov 9, 2018
Istanbul
 
ICCSP--Ei and Scopus 2019
Submission Deadline: Sep 5, 2018
2019 the 3rd International Conference on Cryptography, Security and Privacy (ICCSP 2019)--Ei Compendex and Scopus
Jan 19, 2019 - Jan 21, 2019
Kuala Lumpur, Malaysia
 
SVSS 2018
Submission Deadline: Sep 7, 2018
International Workshop on the Security of Video Surveillance Systems
Nov 27, 2018 - Nov 30, 2018
Auckland, New Zealand
 
SECITC 2018
Submission Deadline: Sep 17, 2018
11th International Conference on Security for Information Technology and Communications
Nov 8, 2018 - Nov 9, 2018
Bucharest, Romania
 
IJIS-IoTSec 2018
Submission Deadline: Oct 1, 2018
Springer IJIS Special Issue on IoT Security and Privacy
N/A
N/A
 
ICISSP 2019
Submission Deadline: Oct 1, 2018
5th International Conference on Information Systems Security and Privacy
Feb 23, 2019 - Feb 25, 2019
Prague, Czech Republic
 
Symmetry-SI 2018
Submission Deadline: Oct 15, 2018
Symmetry and Asymmetry Applications for Internet of Things Security and Privacy
N/A
N/A
 
RASS 2018
Submission Deadline: Oct 21, 2018
Special issue on Recent Advances in Software Security - EURASIP Journal on Information Security
N/A
N/A
 
JISA-IoT-A&D 2018
Submission Deadline: Oct 30, 2018
Recent Advances in Internet-of-Things Attacks and Defences
N/A
N/A
 
FI-IoTSP 2018
Submission Deadline: Oct 31, 2018
Future Internet Journal: Special Issue on IoT Security and Privacy
N/A
N/A
 
C2SI 2019
Submission Deadline: Nov 30, 2018
3rd International Conference on Codes, Cryptology and Information Security
Apr 22, 2019 - Apr 24, 2019
Mohammed V University in Rabat
 
ETRIJ Cyber Security & AI 2019
Submission Deadline: Mar 28, 2019
ETRI Journal Special issue on Cyber Security and AI
N/A
N/A
 

Members
Faculty Members
Postdoctoral Research Fellows
Postgraduate Research Fellows

Publications
Journals
Conferences
Books
Book Chapters
Conference Proceedings Editing

Research Areas

Our main research interests lie in the areas of:

  • Security and Privacy Economics
  • Secure eCommerce, eBusiness, eGovernment, eHealth
  • Privacy Technologies
  • Development of Secure Information Systems
  • Smart Cards Technologies
  • Security and Privacy Legal and Regulatory issues
  • Forensics Investigation; Internet Telephony Security
  • Wireless and Mobile Communications Security
  • Privacy and Trust in Wireless Sensor Networks
  • Security and Privacy in m-health environments
  • Formal Methods for the Analysis and Design of Cryptographic Protocols

Books (in English)
Digital Privacy: Theory, Technologies, and Practices
Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinoudakis, Sabrina De Capitani di Vimercati (Eds.) Auerbach Publications, Taylor and Francis Group, January 2008

Security and Privacy in Mobile and Wireless Networking
Stefanos Gritzalis, Tom Karygiannis, Charalabos Skianis (Eds.) Troubador Publishing Ltd, February 2009

Intrusion Detection and Prevention for Mobile Ecosystems
Georgios Kambourakis, Asaf Shabtai, Constantinos Kolias, Dimitrios Damopoulos (Eds.), CRC Press, September 2017.


Books (in Greek)
Συγχρονη Κρυπτογραφία - Θεωρία και Εφαρμογές
Mike Burmester - Stefanos Gritzalis - Sokratis Katsikas - Vasileios Chrisikopoulos

Προστασία της Ιδιώτικότητας & Τεχνολογίες Πληροφορικής και Επικοινωνιών
Costas Lambrinoudakis - Lilian Mitrou - Stefanos Gritzalis - Sokratis Katsikas

Ασφάλεια Ασυρμάτων και Κινητών Δικτύων Επικοινωνιών
Georgios Kambourakis - Stefanos Gritzalis - Sokratis Katsikas

Ασφάλεια Δικτύων Υπολογιστών
Stefanos Gritzalis - Sokratis Katsikas - Dimitris Gritzalis

Ασφάλεια Πληροφοριακών Συστημάτων
Sokratis Katsikas - Dimitrios Gritzalis - Stefanos Gritzalis

Projects



News
Security Pros Expect Rise in Nation-State Attacks
Posted on Jun 22, 2018

Concerns for nation-state threats grow, with many fearing attackers intend to do harm.

Tesla Breach: Malicious Insider Revenge or Whistleblowing?
Posted on Jun 22, 2018

Just before midnight last Sunday evening (June 17, 2018), Elon Musk sent an email to all staff. He was dismayed, he said, to learn about a Tesla employee "making direct code changes to the Tesla Manufacturing Operating System under false usernames and exporting large amounts of highly sensitive Tesla data to unknown third parties."

ACLU Warns on Forced Malicious Software Updates
Posted on Jun 22, 2018

The ACLU has issued guidance on how software developers should deal with demands on malicious security updates.

Hidden Tunnels: A Favored Tactic to Evade Strong Access Controls
Posted on Jun 22, 2018

Use of Hidden Tunnels to Exfiltrate Data Far More Widespread in Financial Services Than Any Other Industry Sector

New Encrypted Downloader Delivers Metasploit Backdoor
Posted on Jun 22, 2018

A series of cyber-attacks targeting the Middle Eastern region use an encrypted downloader to deliver a Metasploit backdoor, AlienVault reports.

Afghan-Based Attack Disguised as News
Posted on Jun 22, 2018

Attackers use Metasploit to target victims with malware.

How to Shed the Security Operations Doldrums
Posted on Jun 22, 2018

Automating Threat Intelligence Prioritization Allows You to Proactively Deploy Appropriate Intelligence to the Right Tools

"Wavethrough" Bug in Microsoft Edge Leaks Sensitive Information
Posted on Jun 22, 2018

A security vulnerability

Hackers Exploit Drupal Flaw for Monero Mining
Posted on Jun 22, 2018

Network attacks exploiting a recently patched Drupal vulnerability are attempting to drop Monero mining malware onto vulnerable systems, Trend Micro reports.

Cyber Intelligence Firm Intsights Raises $17 Million
Posted on Jun 21, 2018

Israel-born startup Intsights Cyber Intelligence has raised $17 million in a Series C funding round led by Tola Capital. It brings the total capital raised by the firm to $41.3 million ($1.8 million seed funding in 2015; $7.5 million Series A in 2016; and $15 million Series B in 2017).&;

Red Alert Android Trojan for Rent at $500 Per Month
Posted on Jun 21, 2018

The

A Third of UK Orgs Have Sacked Employees for Data Breach Negligence
Posted on Jun 21, 2018

Businesses recognize employee negligence as major security risk, but fail to take action with robust training programs

Fortnite's Android Debut Sees Malicious Apps Launched
Posted on Jun 21, 2018

YouTube videos have been detected claiming to contain downloads for the Android version of Fortnite

Google Marks APKs Distributed by Google Play
Posted on Jun 21, 2018

Google this week announced that it is adding a small amount of security metadata on top of APKs distributed by Google Play in order to verify their authenticity.

New HospitalGown Variant in iOS, Android Apps
Posted on Jun 21, 2018

A Firebase variant was reportedly downloaded 620 million times.

Cisco Patches Critical Flaws in NX-OS Software
Posted on Jun 21, 2018

Cisco on Wednesday released patches for more than 30 security vulnerabilities in its products, including Critical flaws impacting NX-OS Software.

Microsoft Combats Bad Passwords With New Azure Tools
Posted on Jun 21, 2018

Microsoft this week announced the public preview of new Azure tools designed help its customers eliminate easily guessable passwords from their environments.

Attackers Pick Microsoft Office for Zero-Day Exploits
Posted on Jun 21, 2018

Malicious actors leverage Word as the vector of choice.

Stepping Up to the Increasing Demand for Managed Security Services
Posted on Jun 21, 2018

IDC’s recently released five-year (2018-2022)

Younger Employees Identified as 'Main Culprits' of Security Breaches
Posted on Jun 21, 2018

New survey assesses senior-level attitudes towards security risks posed by 18-24-year-old workers


University of the Aegean | Greece

School of Engineering | Information and Communication Systems Engineering

Karlovassi, Samos, 83200, Greece

Email : info-sec-lab@aegean.gr | Fax : +30-22730-82009

ICSD 2008-2017