Contact
University of the Aegean
Department of Information and Communication Systems Engineering
Info Sec Lab
Laboratory of Information & Communication Systems Security

Welcome

Welcome to the home page of the "Info-Sec-Lab" Laboratory of Information & Communication Systems Security, Dept. of Information and Communication Systems Engineering, School of Engineering, University of the Aegean, Greece.





I & CT Security Conferences
ISSR 2016
Submission Deadline: Jul 1, 2016
the 8th International Workshop on Security in e-Science and e-Research
Nov 16, 2016 - Nov 18, 2016
Zhangjiajie (China)
 
ISSR 2016
Submission Deadline: Jul 1, 2016
the 8th International Workshop on Security in e-Science and e-Research
Nov 16, 2016 - Nov 18, 2016
Zhangjiajie (China)
 
IEEE CSCloud (USA) 2016
Submission Deadline: Jul 1, 2016
The 4th IEEE International Conference on Cyber Security and Cloud Computing
Nov 18, 2016 - Nov 20, 2016
New York, USA
 
NTMS 2016
Submission Deadline: Jul 7, 2016
8th IFIP International Conference on New Technologies, Mobility and Security
Nov 21, 2016 - Nov 23, 2016
Larnaca
 
PMC-CUC 2016
Submission Deadline: Jul 15, 2016
Cybersecurity for Ubiquitous Cities -- Pervasive and Mobile Computing
N/A
N/A
 
IEEE CISDA 2016
Submission Deadline: Jul 18, 2016
2016 IEEE Symposium on Computational Intelligence for Security and Defense Applications
Dec 6, 2016 - Dec 9, 2016
Athens, Greece
 
MIST 2016
Submission Deadline: Jul 27, 2016
8th ACM CCS International Workshop on Managing Insider Security Threats
Oct 24, 2016 - Oct 28, 2016
Hofburg Palace, Vienna, Austria
 
DataSecCloudBook 2017
Submission Deadline: Jul 31, 2016
Call for Book Chapters: Data Security in Cloud Computing - 2017
Mar 13, 2016 - Mar 13, 2016
IET
 
IEEE CSCloud (USA) 2016
Submission Deadline: Jul 1, 2016
The 4th IEEE International Conference on Cyber Security and Cloud Computing
Nov 18, 2016 - Nov 20, 2016
New York, USA
 
NTMS 2016
Submission Deadline: Jul 7, 2016
8th IFIP International Conference on New Technologies, Mobility and Security
Nov 21, 2016 - Nov 23, 2016
Larnaca
 
PMC-CUC 2016
Submission Deadline: Jul 15, 2016
Cybersecurity for Ubiquitous Cities -- Pervasive and Mobile Computing
N/A
N/A
 
IEEE CISDA 2016
Submission Deadline: Jul 18, 2016
2016 IEEE Symposium on Computational Intelligence for Security and Defense Applications
Dec 6, 2016 - Dec 9, 2016
Athens, Greece
 
MIST 2016
Submission Deadline: Jul 27, 2016
8th ACM CCS International Workshop on Managing Insider Security Threats
Oct 24, 2016 - Oct 28, 2016
Hofburg Palace, Vienna, Austria
 
DataSecCloudBook 2017
Submission Deadline: Jul 31, 2016
Call for Book Chapters: Data Security in Cloud Computing - 2017
Mar 13, 2016 - Mar 13, 2016
IET
 
APSEC 2016
Submission Deadline: Aug 1, 2016
The Asia-Pacific Conference on Security and International Relations 2016
Dec 1, 2016 - Dec 2, 2016
Osaka, Japan
 
IEEE IDS 2016
Submission Deadline: Aug 1, 2016
The 2nd IEEE International Conference on Intelligent Data and Security
Dec 17, 2016 - Dec 19, 2016
Shenzhen, China
 
PST 2016
Submission Deadline: Aug 1, 2016
14th International Conference on Privacy, Security and Trust
Dec 12, 2016 - Dec 14, 2016
Auckland, New Zealand
 
C&S-SDSCTM 2016
Submission Deadline: Aug 1, 2016
Special Issue on Security Data Science and Cyber Threat Management -- Computers & Security
N/A
N/A
 
WICS 2016
Submission Deadline: Aug 6, 2016
3rd International Workshop on Information and Communication Security
Nov 22, 2016 - Nov 25, 2016
Hiroshima, Japan
 
ICCWS 2017
Submission Deadline: Aug 11, 2016
12th International Conference on Cyber Warfare and Security ICCWS 2017
Mar 2, 2017 - Mar 3, 2017
Dayton, Ohio, USA
 
FGCS SI - CI for OSN 2016
Submission Deadline: Oct 1, 2016
Special issue on Recent research in Computational Intelligence paradigms into Security and Privacy for Online Social Networks (OSNs)
Oct 1, 2016 - May 30, 2017
Elsevier
 
INTRICATE-SEC 2017
Submission Deadline: Oct 15, 2016
5th International Workshop on Security Intricacies in Cyber-Physical Systems and Services (INTRICATE-SEC 2017)
Mar 27, 2017 - Mar 29, 2017
Taipei, Taiwan
 
IEEE TDSC Journal SI 2016
Submission Deadline: Nov 16, 2016
IEEE TDSC Special Issue on Data-Driven Dependability and Security
N/A
N/A
 
Future_Internet-SI 2016
Submission Deadline: Nov 30, 2016
Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
N/A
N/A
 
TDSC-PSCE 2017
Submission Deadline: Jan 31, 2017
Special Issue on Paradigm Shifts in Cryptographic Engineering -- IEEE Transactions on Dependable and Secure Computing
N/A
N/A
 

Members
Faculty Members
Postdoctoral Research Fellows
Postgraduate Research Fellows

Publications
Journals
Conferences
Books
Book Chapters
Conference Proceedings Editing

Research Areas

Our main research interests lie in the areas of:

  • Security and Privacy Economics
  • Secure eCommerce, eBusiness, eGovernment, eHealth
  • Privacy Technologies
  • Development of Secure Information Systems
  • Smart Cards Technologies
  • Security and Privacy Legal and Regulatory issues
  • Forensics Investigation; Internet Telephony Security
  • Wireless and Mobile Communications Security
  • Privacy and Trust in Wireless Sensor Networks
  • Security and Privacy in m-health environments
  • Formal Methods for the Analysis and Design of Cryptographic Protocols

Books (in English)
Digital Privacy: Theory, Technologies, and Practices
Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinoudakis, Sabrina De Capitani di Vimercati (Eds.) Auerbach Publications, Taylor and Francis Group, January 2008

Security and Privacy in Mobile and Wireless Networking
Stefanos Gritzalis, Tom Karygiannis, Charalabos Skianis (Eds.) Troubador Publishing Ltd, February 2009


Books (in Greek)
Συγχρονη Κρυπτογραφία - Θεωρία και Εφαρμογές
Mike Burmester - Stefanos Gritzalis - Sokratis Katsikas - Vasileios Chrisikopoulos

Προστασία της Ιδιώτικότητας & Τεχνολογίες Πληροφορικής και Επικοινωνιών
Costas Lambrinoudakis - Lilian Mitrou - Stefanos Gritzalis - Sokratis Katsikas

Ασφάλεια Ασυρμάτων και Κινητών Δικτύων Επικοινωνιών
Georgios Kambourakis - Stefanos Gritzalis - Sokratis Katsikas

Ασφάλεια Δικτύων Υπολογιστών
Stefanos Gritzalis - Sokratis Katsikas - Dimitris Gritzalis

Ασφάλεια Πληροφοριακών Συστημάτων
Sokratis Katsikas - Dimitrios Gritzalis - Stefanos Gritzalis

Projects



News
New Report Maps CIS Critical Security Controls Against SAP
Posted on May 30, 2016

The SANS CIS top twenty critical security controls (

Hardcoded Credentials Found in Medical System
Posted on May 30, 2016

Carnegie Mellon University's CERT has

Researchers Devise "Perfect" Data Exfiltration Technique
Posted on May 30, 2016

The hackers behind the $81 million heist from the Bangladesh central bank have likely been involved in a series of attacks on the financial system, a US security firm has concluded.

NTP Servers Exposed to Long-Distance Wireless Attacks
Posted on May 28, 2016

Over the past few weeks, researchers have observed a spike in the number of malicious spam emails using attached JavaScript files to distribute malware such as the infamous Locky ransomware.

Bank Hackers Linked to Wider Campaign: Researchers
Posted on May 27, 2016

The authors of Android Trojans have adapted their attack models to target the permission-granting model that Google has introduced in Android 6.0 Marshmallow, security firm Symantec has discovered.

Android clickjacking attack research updated but questions remain
Posted on May 27, 2016

US Reps. Poe and Conyers join Sen. Wyden's fight against changes to Rule 41 that would remove limits on government hacking, introduce companion bill to quash changes.

Defense Department Runs the US Nuclear Arsenal Using Floppy Disks
Posted on May 27, 2016

More than 75% of the US IT budget goes to maintaining legacy IT systems that are up to 50 years old.

RSA: Cloud visibility, analytics crucial to enterprises
Posted on May 27, 2016

US Reps. Poe and Conyers join Sen. Wyden's fight against changes to Rule 41 that would remove limits on government hacking, introduce companion bill to quash changes.

House Reps tackle Rule 41 to limit government hacking
Posted on May 27, 2016

US Reps. Poe and Conyers join Sen. Wyden's fight against changes to Rule 41 that would remove limits on government hacking, introduce companion bill to quash changes.

ImageMagick calls into question responsible disclosure reporting
Posted on May 27, 2016

US Reps. Poe and Conyers join Sen. Wyden's fight against changes to Rule 41 that would remove limits on government hacking, introduce companion bill to quash changes.

Swift Hackers Linked to ‘North Korean’ Lazarus Group
Posted on May 27, 2016

Symantec claims a Philippine bank may be group’s fourth known victim

TeslaCrypt master key release confounds experts
Posted on May 27, 2016

US Reps. Poe and Conyers join Sen. Wyden's fight against changes to Rule 41 that would remove limits on government hacking, introduce companion bill to quash changes.

Data Leak Puts Ulster Prison Staff in Danger
Posted on May 27, 2016

Email containing personal details sent to wrong person

Paul Vixie on the glibc bug, Internet crime and more
Posted on May 27, 2016

US Reps. Poe and Conyers join Sen. Wyden's fight against changes to Rule 41 that would remove limits on government hacking, introduce companion bill to quash changes.

DHL Customers Phished Using South African Gov Website
Posted on May 27, 2016

A South African government website is being hacked to host the malicious phishing URL.

Lieu, Hurd school House colleagues on cyberhygiene, defense
Posted on May 27, 2016

US Reps. Poe and Conyers join Sen. Wyden's fight against changes to Rule 41 that would remove limits on government hacking, introduce companion bill to quash changes.

Ingenious attack mixes memory deduplication with Rowhammer
Posted on May 27, 2016

US Reps. Poe and Conyers join Sen. Wyden's fight against changes to Rule 41 that would remove limits on government hacking, introduce companion bill to quash changes.

TorrentLocker Detected Targeting Computers in Sweden
Posted on May 27, 2016

Retiring obsolete SHA-1 and RC4 cryptographic algorithms, SSLv3 protocol
Posted on May 27, 2016

US Reps. Poe and Conyers join Sen. Wyden's fight against changes to Rule 41 that would remove limits on government hacking, introduce companion bill to quash changes.

View All Sponsored News
Posted on May 27, 2016

US Reps. Poe and Conyers join Sen. Wyden's fight against changes to Rule 41 that would remove limits on government hacking, introduce companion bill to quash changes.


University of the Aegean | Greece

School of Engineering | Information and Communication Systems Engineering

Karlovassi, Samos, 83200, Greece

Email : info-sec-lab@aegean.gr | Fax : +30-22730-82009

ICSD 2008-2015