University of the Aegean
Department of Information and Communication Systems Engineering
Info Sec Lab
Laboratory of Information & Communication Systems Security


Welcome to the home page of the "Info-Sec-Lab" Laboratory of Information & Communication Systems Security, Dept. of Information and Communication Systems Engineering, School of Engineering, University of the Aegean, Greece.

I & CT Security Conferences
CISSI 2016
Submission Deadline: Sep 10, 2016
International Symposium on Information Systems Security
Dec 8, 2016 - Dec 10, 2016
Submission Deadline: Sep 15, 2016
Conference on Data and Application Security and Privacy
Mar 22, 2017 - Mar 24, 2017
Scottsdale, Arizona, USA
FGCS SI - CI for OSN 2016
Submission Deadline: Oct 1, 2016
Special issue on Recent research in Computational Intelligence paradigms into Security and Privacy for Online Social Networks (OSNs)
Oct 1, 2016 - May 30, 2017
Submission Deadline: Oct 15, 2016
5th International Workshop on Security Intricacies in Cyber-Physical Systems and Services (INTRICATE-SEC 2017)
Mar 27, 2017 - Mar 29, 2017
Taipei, Taiwan
IEEE TDSC Journal SI 2016
Submission Deadline: Nov 16, 2016
IEEE TDSC Special Issue on Data-Driven Dependability and Security
Future_Internet-SI 2016
Submission Deadline: Nov 30, 2016
Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
EmergMediaSec 2016
Submission Deadline: Dec 2, 2016
Special issue on Emerging Challenges and Solutions for Multimedia Security in Advances in Multimedia journal
ECCWS 2017
Submission Deadline: Dec 8, 2016
16th European Conference on Cyber Warfare and SecurityECCWS 2017
Jun 29, 2017 - Jun 30, 2017
Dublin, Ireland
Submission Deadline: Jan 31, 2017
Special Issue on Paradigm Shifts in Cryptographic Engineering -- IEEE Transactions on Dependable and Secure Computing

Faculty Members
Postdoctoral Research Fellows
Postgraduate Research Fellows

Book Chapters
Conference Proceedings Editing

Research Areas

Our main research interests lie in the areas of:

  • Security and Privacy Economics
  • Secure eCommerce, eBusiness, eGovernment, eHealth
  • Privacy Technologies
  • Development of Secure Information Systems
  • Smart Cards Technologies
  • Security and Privacy Legal and Regulatory issues
  • Forensics Investigation; Internet Telephony Security
  • Wireless and Mobile Communications Security
  • Privacy and Trust in Wireless Sensor Networks
  • Security and Privacy in m-health environments
  • Formal Methods for the Analysis and Design of Cryptographic Protocols

Books (in English)
Digital Privacy: Theory, Technologies, and Practices
Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinoudakis, Sabrina De Capitani di Vimercati (Eds.) Auerbach Publications, Taylor and Francis Group, January 2008

Security and Privacy in Mobile and Wireless Networking
Stefanos Gritzalis, Tom Karygiannis, Charalabos Skianis (Eds.) Troubador Publishing Ltd, February 2009

Books (in Greek)
Συγχρονη Κρυπτογραφία - Θεωρία και Εφαρμογές
Mike Burmester - Stefanos Gritzalis - Sokratis Katsikas - Vasileios Chrisikopoulos

Προστασία της Ιδιώτικότητας & Τεχνολογίες Πληροφορικής και Επικοινωνιών
Costas Lambrinoudakis - Lilian Mitrou - Stefanos Gritzalis - Sokratis Katsikas

Ασφάλεια Ασυρμάτων και Κινητών Δικτύων Επικοινωνιών
Georgios Kambourakis - Stefanos Gritzalis - Sokratis Katsikas

Ασφάλεια Δικτύων Υπολογιστών
Stefanos Gritzalis - Sokratis Katsikas - Dimitris Gritzalis

Ασφάλεια Πληροφοριακών Συστημάτων
Sokratis Katsikas - Dimitrios Gritzalis - Stefanos Gritzalis


Researchers Crack Mad Max Botnet's DGA
Posted on Jul 27, 2016

Researchers at Arbor Networks, the security division of Netscout, recently managed to crack the heavy obfuscated domain generation algorithm (DGA) of Mad Max, a targeted Trojan that has created a botnet of infected machines in sixteen countries.

Vulnerabilities Found in Osram Smart Lighting Products
Posted on Jul 27, 2016

Researchers at security firm Rapid7 have identified several vulnerabilities in the home and professional versions of Osram’s Lightify smart connected lighting products.

SafeBreach Raises $15 Million to Give Enterprises a 'Hackers View'
Posted on Jul 26, 2016

Microsoft is launching new Microsoft Authenticator applications next month in popular mobile app stores to provide users with multi-factor authentication (MFA) functionality on the go.

DNC Chairwoman to Resign Following Wikileaks Email Leak
Posted on Jul 26, 2016

The Democratic National Committee (DNC) chairwoman Debbie Wasserman Schultz has announced she is to step down from her post following the extensive email leak of some 19,000 messages from Democratic party officials.

Analysts Reveal Arsenal of Cyber Tools Used by Islamic Terrorists
Posted on Jul 26, 2016

Jihadist groups use a variety of digital tools and online services that allow them to maintain a strong online presence, while also helping them remain undetected by adversaries, a recent report from Flashpoint reveals.

O2 Customer Data Discovered for Sale on Dark Web
Posted on Jul 26, 2016

Operator claims it wasn’t breached

How Threat Awareness is Different From Threat Intelligence
Posted on Jul 26, 2016

Cybersecurity startup

Researchers Use Disk Cleanup to Bypass UAC on Windows 10
Posted on Jul 26, 2016


EU Data Watchdogs Approve EU-US Privacy Shield
Posted on Jul 26, 2016

The framework that replaces Safe Harbor will run for a period of one year, after which there will be a joint review of its successes and failures.

Microsoft to Launch New Cross-Platform MFA Mobile Apps
Posted on Jul 26, 2016

Researchers discovered that an SSL flaw in Amazon’s Silk web browser could have been exploited by hackers to monitor users’ search engine traffic.

Amazon Kindle Browser Exposed Searches to MitM Attacks
Posted on Jul 26, 2016

The India-linked threat actor known as Patchwork or Dropping Elephant is targeting more than just government-associated organizations, Symantec researchers say.

Wireless Keyboards Vulnerable to Sniffing, Injection Attacks
Posted on Jul 26, 2016

Wireless keyboards from several vendors don’t use encryption when communicating with their USB dongle, allowing remote attackers to intercept keystrokes or send their own commands to the targeted computer.

Patchwork Threat Actor Expands Target List
Posted on Jul 26, 2016

Researchers have found a way to bypass the User Account Control (UAC) security feature on Windows 10 by leveraging the Disk Cleanup utility.

Security Concerns as Amazon Prepares for UK Drone Deliveries
Posted on Jul 26, 2016

Aerial vehicles must be regulated and QA tested

Mozilla Set to Block ‘Non Essential’ Flash Content
Posted on Jul 26, 2016

The slow death of the Adobe software continues

Europol Declares War on Ransomware
Posted on Jul 25, 2016

The Federal Bureau of Investigation said Monday it was investigating the "cyber intrusion" at the Democratic National Committee after leaked internal emails show party leaders sought to undermine the campaign of Bernie Sanders.

New Decryption Tools Aid Ransomware Fight
Posted on Jul 25, 2016

AVG and Palo Alto Networks step up

Vendors, Police and Europol Begin Ransomware Fightback
Posted on Jul 25, 2016

An initiative to educate and prevent further ransomware payments has been launched by Europol, law enforcement and the private sector

Pornhub Hacked to Access Billions of Users' Information
Posted on Jul 25, 2016

The white hats could have “dump[ed] the complete database of Pornhub" including the IDs of those uploading and starring in adult vids.

FBI Probes Democratic Email Hack, but is Russia to Blame?
Posted on Jul 25, 2016

MIT Hit By More Than 35 DDoS Attacks So Far This Year

University of the Aegean | Greece

School of Engineering | Information and Communication Systems Engineering

Karlovassi, Samos, 83200, Greece

Email : | Fax : +30-22730-82009

ICSD 2008-2015