Contact
University of the Aegean
Department of Information and Communication Systems Engineering
Info Sec Lab
Laboratory of Information & Communication Systems Security

Welcome

Welcome to the home page of the "Info-Sec-Lab" Laboratory of Information & Communication Systems Security, Dept. of Information and Communication Systems Engineering, School of Engineering, University of the Aegean, Greece.





I & CT Security Conferences
ICCCS 2017
Submission Deadline: Mar 28, 2017
The 3rd International Conference on Cloud Computing and Security
Jun 16, 2017 - Jun 18, 2017
Nanjing, China
 
DSC 2017
Submission Deadline: Mar 31, 2017
2017 IEEE Conference on Dependable and Secure Computing
Aug 7, 2017 - Aug 10, 2017
Taipei, Taiwan
 
HASP 2017
Submission Deadline: Mar 31, 2017
Hardware and Architectural Support for Security and Privacy 2017
Jun 25, 2017 - Jun 25, 2017
Toronto, Canada
 
NSAA 2017
Submission Deadline: Mar 31, 2017
2nd Workshop on Network Security Analytics and Automation
Aug 3, 2017 - Aug 3, 2017
Vancouver, Canada
 
ATIS 2017
Submission Deadline: Apr 2, 2017
The 2017 International Conference on Applications and Technologies in Information Security
Jul 6, 2017 - Jul 7, 2017
Auckland, New Zealand
 
SHCIS 2017
Submission Deadline: Apr 4, 2017
4th Workshop on Security in highly connected IT systems
Jun 19, 2017 - Jun 22, 2017
Neuchâtel, Switzerland
 
Security and Privacy for Mobile Users 2017
Submission Deadline: Apr 7, 2017
Mobile Information Systems - Special issue on: “Advances in Security and Privacy for Mobile Users in Intelligent Environments”
N/A
N/A
 
IEEE ISI 2017
Submission Deadline: Apr 10, 2017
2017 IEEE International Conference on Intelligence and Security Informatics
Jul 22, 2017 - Jul 24, 2017
Beijing, China
 
NSPW 2017
Submission Deadline: Apr 14, 2017
The New Security Paradigms Workshop
Oct 2, 2017 - Oct 4, 2017
Islamorada, FL, USA
 
MSPN 2017
Submission Deadline: Apr 20, 2017
International Conference on Mobile, Secure and Programmable Networking
Jun 29, 2017 - Jun 30, 2017
Paris
 
ISS for IISA Conference 2017
Submission Deadline: Apr 24, 2017
Intelligent Secured Systems track
Aug 28, 2017 - Aug 30, 2017
Cyprus
 
SECURWARE 2017
Submission Deadline: Apr 25, 2017
The Eleventh International Conference on Emerging Security Information, Systems and Technologies
Sep 10, 2017 - Sep 14, 2017
Rome, Italy
 
ICCST 2017
Submission Deadline: Apr 28, 2017
The 51st International Carnahan Conference on Security Technology
Oct 26, 2017 - Oct 26, 2017
Madrid
 
DASC 2017
Submission Deadline: Apr 30, 2017
The 15th IEEE International Conference on Dependable, Autonomic and Secure Computing
Nov 6, 2017 - Nov 10, 2017
Orlando - Florida USA
 
Games-SI:DMNSP 2017
Submission Deadline: Apr 30, 2017
Games Special Issue on Decision Making for Network Security and Privacy.
N/A
N/A
 
ICCCS 2017
Submission Deadline: Mar 28, 2017
The 3rd International Conference on Cloud Computing and Security
Jun 16, 2017 - Jun 18, 2017
Nanjing, China
 
DSC 2017
Submission Deadline: Mar 31, 2017
2017 IEEE Conference on Dependable and Secure Computing
Aug 7, 2017 - Aug 10, 2017
Taipei, Taiwan
 
HASP 2017
Submission Deadline: Mar 31, 2017
Hardware and Architectural Support for Security and Privacy 2017
Jun 25, 2017 - Jun 25, 2017
Toronto, Canada
 
NSAA 2017
Submission Deadline: Mar 31, 2017
2nd Workshop on Network Security Analytics and Automation
Aug 3, 2017 - Aug 3, 2017
Vancouver, Canada
 
ATIS 2017
Submission Deadline: Apr 2, 2017
The 2017 International Conference on Applications and Technologies in Information Security
Jul 6, 2017 - Jul 7, 2017
Auckland, New Zealand
 
SHCIS 2017
Submission Deadline: Apr 4, 2017
4th Workshop on Security in highly connected IT systems
Jun 19, 2017 - Jun 22, 2017
Neuchâtel, Switzerland
 
Security and Privacy for Mobile Users 2017
Submission Deadline: Apr 7, 2017
Mobile Information Systems - Special issue on: “Advances in Security and Privacy for Mobile Users in Intelligent Environments”
N/A
N/A
 
IEEE ISI 2017
Submission Deadline: Apr 10, 2017
2017 IEEE International Conference on Intelligence and Security Informatics
Jul 22, 2017 - Jul 24, 2017
Beijing, China
 
NSPW 2017
Submission Deadline: Apr 14, 2017
The New Security Paradigms Workshop
Oct 2, 2017 - Oct 4, 2017
Islamorada, FL, USA
 
MSPN 2017
Submission Deadline: Apr 20, 2017
International Conference on Mobile, Secure and Programmable Networking
Jun 29, 2017 - Jun 30, 2017
Paris
 
ISS for IISA Conference 2017
Submission Deadline: Apr 24, 2017
Intelligent Secured Systems track
Aug 28, 2017 - Aug 30, 2017
Cyprus
 
SECURWARE 2017
Submission Deadline: Apr 25, 2017
The Eleventh International Conference on Emerging Security Information, Systems and Technologies
Sep 10, 2017 - Sep 14, 2017
Rome, Italy
 
ICCST 2017
Submission Deadline: Apr 28, 2017
The 51st International Carnahan Conference on Security Technology
Oct 26, 2017 - Oct 26, 2017
Madrid
 
DASC 2017
Submission Deadline: Apr 30, 2017
The 15th IEEE International Conference on Dependable, Autonomic and Secure Computing
Nov 6, 2017 - Nov 10, 2017
Orlando - Florida USA
 
Games-SI:DMNSP 2017
Submission Deadline: Apr 30, 2017
Games Special Issue on Decision Making for Network Security and Privacy.
N/A
N/A
 
SI: Security-BD-SmartCity 2017
Submission Deadline: May 1, 2017
Special Issue on Security and Privacy in Big Data-enabled Smart Cities: Opportunities and Challenges
N/A
N/A
 
PSCare 2017
Submission Deadline: May 1, 2017
The Fourth International Workshop on Privacy and Security in HealthCare 2017
Sep 18, 2017 - Sep 20, 2017
Lund, Sweden
 
INSERT 2017
Submission Deadline: May 1, 2017
1st International Conference on Security, Privacy, and Trust (INSERT'17)
Sep 4, 2017 - Sep 7, 2017
Prague, Czech Republic
 
CSET 2017
Submission Deadline: May 2, 2017
10th USENIX Workshop on Cyber Security Experimentation and Test
Aug 14, 2017 - Aug 14, 2017
VANCOUVER, BC
 
EuropeanSeC 2017
Submission Deadline: May 9, 2017
2017 European Security Conference
Jun 5, 2017 - Jun 6, 2017
Lisbon
 
GraMSec 2017
Submission Deadline: May 21, 2017
The Fourth International Workshop on Graphical Models for Security
Aug 21, 2017 - Aug 21, 2017
Santa Barbara, CA, USA
 
SPBP 2017
Submission Deadline: May 26, 2017
Workshop on Security and Privacy-enhanced Business Process Management
Sep 11, 2017 - Sep 11, 2017
Barcelona, Spain
 
MobiSec 2017
Submission Deadline: May 26, 2017
Special Issue on Mobile Systems, Mobile Networks and Mobile Cloud: Security, Privacy and Digital Forensics
N/A
N/A
 
SKM 2017
Submission Deadline: Jun 15, 2017
Secure Knowledge Management Workshop 2017
Oct 6, 2017 - Oct 7, 2017
Tampa, FL, USA
 
SMGSSP 2017
Submission Deadline: Jun 15, 2017
Smart Micro-Grid Systems Security and Privacy
Nov 15, 2016 - Mar 31, 2018
Book (Springer)
 
GameSec 2017
Submission Deadline: Jun 29, 2017
GameSec 2017 : Conference on Decision and Game Theory for Security
Oct 23, 2017 - Oct 25, 2017
Vienna, Austria
 
Future_Internet-SI 2017
Submission Deadline: Jun 30, 2017
Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
N/A
N/A
 
SMDAP_WN 2017
Submission Deadline: Jul 24, 2017
Special Collection on Security Mechanisms and Data Access Protocols in Innovative Wireless Networks - IJDSN (IF: 0.906)
N/A
N/A
 
MISC.conf 2017
Submission Deadline: Aug 15, 2017
MISC.conf Security Conference
Oct 21, 2017 - Oct 22, 2017
Minneapolis
 
Smart-City-IoT-Security 2017
Submission Deadline: Sep 1, 2017
Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
N/A
N/A
 
SI: Security-BD-SmartCity 2017
Submission Deadline: May 1, 2017
Special Issue on Security and Privacy in Big Data-enabled Smart Cities: Opportunities and Challenges
N/A
N/A
 
PSCare 2017
Submission Deadline: May 1, 2017
The Fourth International Workshop on Privacy and Security in HealthCare 2017
Sep 18, 2017 - Sep 20, 2017
Lund, Sweden
 
INSERT 2017
Submission Deadline: May 1, 2017
1st International Conference on Security, Privacy, and Trust (INSERT'17)
Sep 4, 2017 - Sep 7, 2017
Prague, Czech Republic
 
CSET 2017
Submission Deadline: May 2, 2017
10th USENIX Workshop on Cyber Security Experimentation and Test
Aug 14, 2017 - Aug 14, 2017
VANCOUVER, BC
 
EuropeanSeC 2017
Submission Deadline: May 9, 2017
2017 European Security Conference
Jun 5, 2017 - Jun 6, 2017
Lisbon
 
GraMSec 2017
Submission Deadline: May 21, 2017
The Fourth International Workshop on Graphical Models for Security
Aug 21, 2017 - Aug 21, 2017
Santa Barbara, CA, USA
 
SPBP 2017
Submission Deadline: May 26, 2017
Workshop on Security and Privacy-enhanced Business Process Management
Sep 11, 2017 - Sep 11, 2017
Barcelona, Spain
 
MobiSec 2017
Submission Deadline: May 26, 2017
Special Issue on Mobile Systems, Mobile Networks and Mobile Cloud: Security, Privacy and Digital Forensics
N/A
N/A
 
SKM 2017
Submission Deadline: Jun 15, 2017
Secure Knowledge Management Workshop 2017
Oct 6, 2017 - Oct 7, 2017
Tampa, FL, USA
 
SMGSSP 2017
Submission Deadline: Jun 15, 2017
Smart Micro-Grid Systems Security and Privacy
Nov 15, 2016 - Mar 31, 2018
Book (Springer)
 
GameSec 2017
Submission Deadline: Jun 29, 2017
GameSec 2017 : Conference on Decision and Game Theory for Security
Oct 23, 2017 - Oct 25, 2017
Vienna, Austria
 
Future_Internet-SI 2017
Submission Deadline: Jun 30, 2017
Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
N/A
N/A
 
SMDAP_WN 2017
Submission Deadline: Jul 24, 2017
Special Collection on Security Mechanisms and Data Access Protocols in Innovative Wireless Networks - IJDSN (IF: 0.906)
N/A
N/A
 
MISC.conf 2017
Submission Deadline: Aug 15, 2017
MISC.conf Security Conference
Oct 21, 2017 - Oct 22, 2017
Minneapolis
 
Smart-City-IoT-Security 2017
Submission Deadline: Sep 1, 2017
Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
N/A
N/A
 
HF 2017
Submission Deadline: Oct 1, 2017
Hackfest.ca 2017 | Canada largest hacking conference
Nov 3, 2017 - Nov 5, 2017
Quebec City, Qc, Canada
 

Members
Faculty Members
Postdoctoral Research Fellows
Postgraduate Research Fellows

Publications
Journals
Conferences
Books
Book Chapters
Conference Proceedings Editing

Research Areas

Our main research interests lie in the areas of:

  • Security and Privacy Economics
  • Secure eCommerce, eBusiness, eGovernment, eHealth
  • Privacy Technologies
  • Development of Secure Information Systems
  • Smart Cards Technologies
  • Security and Privacy Legal and Regulatory issues
  • Forensics Investigation; Internet Telephony Security
  • Wireless and Mobile Communications Security
  • Privacy and Trust in Wireless Sensor Networks
  • Security and Privacy in m-health environments
  • Formal Methods for the Analysis and Design of Cryptographic Protocols

Books (in English)
Digital Privacy: Theory, Technologies, and Practices
Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinoudakis, Sabrina De Capitani di Vimercati (Eds.) Auerbach Publications, Taylor and Francis Group, January 2008

Security and Privacy in Mobile and Wireless Networking
Stefanos Gritzalis, Tom Karygiannis, Charalabos Skianis (Eds.) Troubador Publishing Ltd, February 2009


Books (in Greek)
Συγχρονη Κρυπτογραφία - Θεωρία και Εφαρμογές
Mike Burmester - Stefanos Gritzalis - Sokratis Katsikas - Vasileios Chrisikopoulos

Προστασία της Ιδιώτικότητας & Τεχνολογίες Πληροφορικής και Επικοινωνιών
Costas Lambrinoudakis - Lilian Mitrou - Stefanos Gritzalis - Sokratis Katsikas

Ασφάλεια Ασυρμάτων και Κινητών Δικτύων Επικοινωνιών
Georgios Kambourakis - Stefanos Gritzalis - Sokratis Katsikas

Ασφάλεια Δικτύων Υπολογιστών
Stefanos Gritzalis - Sokratis Katsikas - Dimitris Gritzalis

Ασφάλεια Πληροφοριακών Συστημάτων
Sokratis Katsikas - Dimitrios Gritzalis - Stefanos Gritzalis

Projects



News
Briton Arrested Over Deutsche Telekom Hacking
Posted on Feb 24, 2017

A British national has been arrested at a London airport on suspicion of staging a cyber attack on Deutsche Telekom last year that

CloudFlare Leaked Sensitive Customer Data
Posted on Feb 24, 2017

CloudFlare has been working around the clock in the past few days to address a critical security problem that led to sensitive customer data getting leaked and cached by search engines.

U.S. Oil and Gas Industry Lagging in Security: Report
Posted on Feb 24, 2017

The oil and gas industry in the United States is largely unprepared to address cybersecurity risks in operational technology (OT) environments, according to a study commissioned by German engineering giant Siemens.

Necurs is Back and Ready to DDoS Someone
Posted on Feb 24, 2017

Necurs is not only a spambot, it is a modular piece of malware that can add new capabilities at any time.

Security Awareness Training to Explode in Next 10 Years
Posted on Feb 24, 2017

Fortune 500 and Global 2000 corporations will consider security awareness training as ‘fundamental’ to their cyber-defense strategies by 2021.

D-Link Patches Serious Flaws in DGS-1510 Switches
Posted on Feb 24, 2017

D-Link has released firmware updates for the company’s DGS-1510 stackable managed switches to address serious vulnerabilities that can be exploited remotely to hijack the devices.

Hospitals Under Attack for Lucrative Patient Data
Posted on Feb 23, 2017

Trend Micro report reveals extent of exposed systems

Poison Ivy RAT Campaign Leverages New Delivery Techniques
Posted on Feb 23, 2017

A recently observed campaign using the&;

Q&A: Yubico brings FIDO authentication protocol to the masses
Posted on Feb 23, 2017

Google restructured its network security with the BeyondCorp program and wants to show other organizations how to move past firewalls.

First SHA-1 Collision Attack Conducted by Google, CWI
Posted on Feb 23, 2017

Researchers at Google and Centrum Wiskunde & Informatica (CWI) in the Netherlands have managed to conduct the first real world collision attack against SHA-1, creating two documents with different content but identical hashes.

Google Research Brings End to SHA-1
Posted on Feb 23, 2017

Google has announced research that it hopes will begin the sunset process on the SHA-1 encryption hash.

Microsoft Patch Tuesday February release delayed by a month
Posted on Feb 23, 2017

Google restructured its network security with the BeyondCorp program and wants to show other organizations how to move past firewalls.

Noise-Canceling Headphones for Your Threat Intel Team
Posted on Feb 23, 2017

With Transparency and Customized Scoring, You Cancel Out The Noise That’s Distracting Your Threat Intelligence Team

Most Hackers Can Compromise You in 12 Hours or Less
Posted on Feb 23, 2017

A full 81% say they can identify and take valuable data with 24 hours.

Code Execution Flaw Affected Linux Kernel Since 2005
Posted on Feb 23, 2017

A researcher has discovered a serious locally exploitable vulnerability that appears to have been around in the Linux kernel for more than 11 years. The flaw has been addressed in the kernel and Linux distributions are working on releasing patches.

Understanding of security remediation differs for CISOs, researchers
Posted on Feb 23, 2017

Google restructured its network security with the BeyondCorp program and wants to show other organizations how to move past firewalls.

Upcoming cybersecurity executive order leaves RSAC experts optimistic
Posted on Feb 23, 2017

Google restructured its network security with the BeyondCorp program and wants to show other organizations how to move past firewalls.

Hard Drive LED Allows Data Theft From Air-Gapped PCs
Posted on Feb 23, 2017

Researchers at Ben-Gurion University of the Negev in Israel have disclosed yet another method that can be used to exfiltrate data from air-gapped computers, and this time it involves the activity LED of hard disk drives (HDDs).

Windows 10 privacy issues persist, says EU privacy watchdog
Posted on Feb 23, 2017

Google restructured its network security with the BeyondCorp program and wants to show other organizations how to move past firewalls.

Q&A: Digging into darknet technology with Farsight's Andrew Lewman
Posted on Feb 23, 2017

Google restructured its network security with the BeyondCorp program and wants to show other organizations how to move past firewalls.


University of the Aegean | Greece

School of Engineering | Information and Communication Systems Engineering

Karlovassi, Samos, 83200, Greece

Email : info-sec-lab@aegean.gr | Fax : +30-22730-82009

ICSD 2008-2015