Contact
University of the Aegean
Department of Information and Communication Systems Engineering
Info Sec Lab
Laboratory of Information & Communication Systems Security

Welcome

Welcome to the home page of the "Info-Sec-Lab" Laboratory of Information & Communication Systems Security, Dept. of Information and Communication Systems Engineering, School of Engineering, University of the Aegean, Greece.





I & CT Security Conferences
ICCST 2017
Submission Deadline: Apr 28, 2017
The 51st International Carnahan Conference on Security Technology
Oct 26, 2017 - Oct 26, 2017
Madrid
 
DASC 2017
Submission Deadline: Apr 30, 2017
The 15th IEEE International Conference on Dependable, Autonomic and Secure Computing
Nov 6, 2017 - Nov 10, 2017
Orlando - Florida USA
 
Games-SI:DMNSP 2017
Submission Deadline: Apr 30, 2017
Games Special Issue on Decision Making for Network Security and Privacy.
N/A
N/A
 
PSCare 2017
Submission Deadline: May 1, 2017
The Fourth International Workshop on Privacy and Security in HealthCare 2017
Sep 18, 2017 - Sep 20, 2017
Lund, Sweden
 
SI: Security-BD-SmartCity 2017
Submission Deadline: May 1, 2017
Special Issue on Security and Privacy in Big Data-enabled Smart Cities: Opportunities and Challenges
N/A
N/A
 
INSERT 2017
Submission Deadline: May 1, 2017
1st International Conference on Security, Privacy, and Trust (INSERT'17)
Sep 4, 2017 - Sep 7, 2017
Prague, Czech Republic
 
CSET 2017
Submission Deadline: May 2, 2017
10th USENIX Workshop on Cyber Security Experimentation and Test
Aug 14, 2017 - Aug 14, 2017
VANCOUVER, BC
 
IWAISe 2017
Submission Deadline: May 5, 2017
1st International Workshop on A.I. in Security
Aug 20, 2017 - Aug 20, 2017
Melbourne
 
EuropeanSeC 2017
Submission Deadline: May 9, 2017
2017 European Security Conference
Jun 5, 2017 - Jun 6, 2017
Lisbon
 
IWSSS 2017
Submission Deadline: May 15, 2017
5th International Workshop on Systems Safety and Security
Jun 29, 2017 - Jul 1, 2017
Targoviste, Romania
 
GraMSec 2017
Submission Deadline: May 21, 2017
The Fourth International Workshop on Graphical Models for Security
Aug 21, 2017 - Aug 21, 2017
Santa Barbara, CA, USA
 
MobiSec 2017
Submission Deadline: May 26, 2017
Special Issue on Mobile Systems, Mobile Networks and Mobile Cloud: Security, Privacy and Digital Forensics
N/A
N/A
 
SPBP 2017
Submission Deadline: May 26, 2017
Workshop on Security and Privacy-enhanced Business Process Management
Sep 11, 2017 - Sep 11, 2017
Barcelona, Spain
 
ACSAC 2017
Submission Deadline: Jun 1, 2017
Annual Computer Security Applications Conference
Dec 4, 2017 - Dec 8, 2017
San Juan, Puerto Rico, USA
 
ICCST 2017
Submission Deadline: Apr 28, 2017
The 51st International Carnahan Conference on Security Technology
Oct 26, 2017 - Oct 26, 2017
Madrid
 
DASC 2017
Submission Deadline: Apr 30, 2017
The 15th IEEE International Conference on Dependable, Autonomic and Secure Computing
Nov 6, 2017 - Nov 10, 2017
Orlando - Florida USA
 
Games-SI:DMNSP 2017
Submission Deadline: Apr 30, 2017
Games Special Issue on Decision Making for Network Security and Privacy.
N/A
N/A
 
PSCare 2017
Submission Deadline: May 1, 2017
The Fourth International Workshop on Privacy and Security in HealthCare 2017
Sep 18, 2017 - Sep 20, 2017
Lund, Sweden
 
SI: Security-BD-SmartCity 2017
Submission Deadline: May 1, 2017
Special Issue on Security and Privacy in Big Data-enabled Smart Cities: Opportunities and Challenges
N/A
N/A
 
INSERT 2017
Submission Deadline: May 1, 2017
1st International Conference on Security, Privacy, and Trust (INSERT'17)
Sep 4, 2017 - Sep 7, 2017
Prague, Czech Republic
 
CSET 2017
Submission Deadline: May 2, 2017
10th USENIX Workshop on Cyber Security Experimentation and Test
Aug 14, 2017 - Aug 14, 2017
VANCOUVER, BC
 
IWAISe 2017
Submission Deadline: May 5, 2017
1st International Workshop on A.I. in Security
Aug 20, 2017 - Aug 20, 2017
Melbourne
 
EuropeanSeC 2017
Submission Deadline: May 9, 2017
2017 European Security Conference
Jun 5, 2017 - Jun 6, 2017
Lisbon
 
IWSSS 2017
Submission Deadline: May 15, 2017
5th International Workshop on Systems Safety and Security
Jun 29, 2017 - Jul 1, 2017
Targoviste, Romania
 
GraMSec 2017
Submission Deadline: May 21, 2017
The Fourth International Workshop on Graphical Models for Security
Aug 21, 2017 - Aug 21, 2017
Santa Barbara, CA, USA
 
MobiSec 2017
Submission Deadline: May 26, 2017
Special Issue on Mobile Systems, Mobile Networks and Mobile Cloud: Security, Privacy and Digital Forensics
N/A
N/A
 
SPBP 2017
Submission Deadline: May 26, 2017
Workshop on Security and Privacy-enhanced Business Process Management
Sep 11, 2017 - Sep 11, 2017
Barcelona, Spain
 
ACSAC 2017
Submission Deadline: Jun 1, 2017
Annual Computer Security Applications Conference
Dec 4, 2017 - Dec 8, 2017
San Juan, Puerto Rico, USA
 
IEEE - ICCS 2017
Submission Deadline: Jun 4, 2017
The UND-SCIEI International Conference on Cyber-Security in Aerospace, Computer Science, and Electrical Engineering (ICCS 2017)--IEEE, Ei Compendex and Scopus
Sep 21, 2017 - Sep 23, 2017
Grand Forks, ND
 
CRiSIS 2017
Submission Deadline: Jun 10, 2017
12th International Conference on Risks and Security of Internet and Systems
Sep 19, 2017 - Sep 21, 2017
Dinard, France
 
SMGSSP 2017
Submission Deadline: Jun 15, 2017
Smart Micro-Grid Systems Security and Privacy
Nov 15, 2016 - Mar 31, 2018
Book (Springer)
 
SKM 2017
Submission Deadline: Jun 15, 2017
Secure Knowledge Management Workshop 2017
Oct 6, 2017 - Oct 7, 2017
Tampa, FL, USA
 
e-Democracy 2017
Submission Deadline: Jun 16, 2017
7th International Conference on Privacy-Preserving, Secure, Intelligent e-Government Services
Dec 14, 2017 - Dec 15, 2017
Athens, Greece
 
GameSec 2017
Submission Deadline: Jun 29, 2017
GameSec 2017 : Conference on Decision and Game Theory for Security
Oct 23, 2017 - Oct 25, 2017
Vienna, Austria
 
Future_Internet-SI 2017
Submission Deadline: Jun 30, 2017
Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
N/A
N/A
 
IEEE CISDA 2017
Submission Deadline: Jul 2, 2017
2017 IEEE Symposium on Computational Intelligence for Security and Defense Applications
Nov 27, 2017 - Dec 1, 2017
Honolulu, Hawaii, USA
 
SMDAP_WN 2017
Submission Deadline: Jul 24, 2017
Special Collection on Security Mechanisms and Data Access Protocols in Innovative Wireless Networks - IJDSN (IF: 0.906)
N/A
N/A
 
ICNS - Ei 2017
Submission Deadline: Aug 5, 2017
2017 The 2nd International Conference on Network Security (ICNS 2017)--ACM, Ei Compendex and Scopus
Dec 8, 2017 - Dec 10, 2017
Kunming, China
 
MISC.conf 2017
Submission Deadline: Aug 15, 2017
MISC.conf Security Conference
Oct 21, 2017 - Oct 21, 2017
Minneapolis
 
Smart-City-IoT-Security 2017
Submission Deadline: Sep 1, 2017
Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
N/A
N/A
 
HF 2017
Submission Deadline: Oct 1, 2017
Hackfest.ca 2017 | Canada largest hacking conference
Nov 3, 2017 - Nov 5, 2017
Quebec City, Qc, Canada
 
ASPMI 2018
Submission Deadline: Oct 15, 2017
Advances in Security and Privacy of Multimodal Interfaces
N/A
N/A
 

Members
Faculty Members
Postdoctoral Research Fellows
Postgraduate Research Fellows

Publications
Journals
Conferences
Books
Book Chapters
Conference Proceedings Editing

Research Areas

Our main research interests lie in the areas of:

  • Security and Privacy Economics
  • Secure eCommerce, eBusiness, eGovernment, eHealth
  • Privacy Technologies
  • Development of Secure Information Systems
  • Smart Cards Technologies
  • Security and Privacy Legal and Regulatory issues
  • Forensics Investigation; Internet Telephony Security
  • Wireless and Mobile Communications Security
  • Privacy and Trust in Wireless Sensor Networks
  • Security and Privacy in m-health environments
  • Formal Methods for the Analysis and Design of Cryptographic Protocols

Books (in English)
Digital Privacy: Theory, Technologies, and Practices
Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinoudakis, Sabrina De Capitani di Vimercati (Eds.) Auerbach Publications, Taylor and Francis Group, January 2008

Security and Privacy in Mobile and Wireless Networking
Stefanos Gritzalis, Tom Karygiannis, Charalabos Skianis (Eds.) Troubador Publishing Ltd, February 2009


Books (in Greek)
Συγχρονη Κρυπτογραφία - Θεωρία και Εφαρμογές
Mike Burmester - Stefanos Gritzalis - Sokratis Katsikas - Vasileios Chrisikopoulos

Προστασία της Ιδιώτικότητας & Τεχνολογίες Πληροφορικής και Επικοινωνιών
Costas Lambrinoudakis - Lilian Mitrou - Stefanos Gritzalis - Sokratis Katsikas

Ασφάλεια Ασυρμάτων και Κινητών Δικτύων Επικοινωνιών
Georgios Kambourakis - Stefanos Gritzalis - Sokratis Katsikas

Ασφάλεια Δικτύων Υπολογιστών
Stefanos Gritzalis - Sokratis Katsikas - Dimitris Gritzalis

Ασφάλεια Πληροφοριακών Συστημάτων
Sokratis Katsikas - Dimitrios Gritzalis - Stefanos Gritzalis

Projects



News
Multiple Zero-days Disclosed in Western Digital NAS Storage Devices
Posted on Mar 06, 2017

The Western Digital My Cloud range of storage devices, ranging from consumer products with up to 16TB storage (My Cloud Mirror) to business devices with up to 32TB storage (My Cloud Pro and My Cloud Expert) contain multiple firmware vulnerabilities that can be exploited remotely.

One Million Stolen Gmail & Yahoo Accounts for Sale on Dark Web
Posted on Mar 06, 2017

The accounts include names, emails and plain text passwords harvested from a variety of infamous data breaches

Twitter Flaw Allowed Access to Locked Accounts
Posted on Mar 06, 2017

Rockstar Games this week launched a public bug bounty program through HackerOne, after running it in private mode for more than nine months.

#GartnerIAM: Tackle GDPR Compliance with Risk Management
Posted on Mar 06, 2017

Gartner claims that despite low take up, GDPR compliance is not a lost cause

RDP Tops Email for Ransomware Distribution: Report
Posted on Mar 06, 2017

A company run by a couple of known spammers has unknowingly leaked a series of files containing sensitive information about its operations, including nearly 1.4 billion user records.

Shellshock Attacks Still Cheap and Easy: IBM
Posted on Mar 06, 2017

Researchers at Kaspersky Lab have come across a new and sophisticated piece of malware that can be used for both cyber espionage and wiping an infected computer’s storage.

HackerOne Offers Free Bounty Programs for Open Source
Posted on Mar 06, 2017

In the wake of high-profile open-source flaws like Heartbleed and Poodle, there’s an awareness that most of the tools and technology that we use every day run on open-source platforms.

Temporary Fix Available for Windows GDI Vulnerability
Posted on Mar 06, 2017

Two and a half years after being discovered, the Shellshock vulnerability continues to be abused in attacks, and for a good reason: it is a very cheap and easy attack, IBM says.

#GartnerIAM: Analytics in IAM Enable Security
Posted on Mar 06, 2017

A lot of negativity in security can be compounded with positivity of the future of IAM and analytics

Consumer Reports Debuts Impartial Privacy Standard
Posted on Mar 06, 2017

It can be used by businesses to measure the privacy and security of products, apps and services.

From Automation to Intelligence - Humans Needed
Posted on Mar 06, 2017

In February 2017, endpoint protection firm CrowdStrike took the unusual step of suing independent product testing organization NSS Labs, "to hold it accountable for unlawfully accessing our software, breaching our contract, pirating our software, and improper security testing."

Nurse Fined After Admitting to Accessing Patient Records
Posted on Mar 06, 2017

Nurse Elaine Lewis was dismissed from role after admitting breaching the Data Protection Act

CrowdStrike Vs NSS Labs, Round 2: NSS Hits Back
Posted on Mar 06, 2017

The security industry wrapped up what has arguably become the most significant trade show in the security industry: RSA Conference. While it’s always interesting to see what challenges hold the industry’s attention and how vendors plan to address them, I find the most useful information comes from informal conversations with customers and industry colleagues as opposed to official booth presentations.

Spammers Leak 1.4 Billion User Records
Posted on Mar 06, 2017

Twitter was until a few months ago affected by a vulnerability that could have been exploited to bypass the social media network’s account locking mechanism.

Shamoon-Linked "StoneDrill" Malware Allows Spying, Destruction
Posted on Mar 06, 2017

When Data Isn’t Keenly Analyzed to Raise it to the Level of Finished Intelligence, it Can Only Answer the Questions an Organization Knows to Ask

Slack hack threatened to expose user account data and messages
Posted on Mar 03, 2017

A new cybersecurity report used a hacker survey to offer a perspective on IT that can often be overlooked and found there may not be any easy answers.

Project Zero discovers Cloudflare bug leaking sensitive customer data
Posted on Mar 03, 2017

A new cybersecurity report used a hacker survey to offer a perspective on IT that can often be overlooked and found there may not be any easy answers.

Edge and IE vulnerability disclosed by Project Zero
Posted on Mar 03, 2017

A new cybersecurity report used a hacker survey to offer a perspective on IT that can often be overlooked and found there may not be any easy answers.

Using Cyber Threat Intelligence to Understand the Cyber Extortion Epidemic
Posted on Mar 03, 2017

Chinese VoIP Kit Contains Backdoor, Warn Researchers
Posted on Mar 03, 2017

Shenzhen-based DBL Technology patched but did not fix issue


University of the Aegean | Greece

School of Engineering | Information and Communication Systems Engineering

Karlovassi, Samos, 83200, Greece

Email : info-sec-lab@aegean.gr | Fax : +30-22730-82009

ICSD 2008-2015