Contact
University of the Aegean
Department of Information and Communication Systems Engineering
Info Sec Lab
Laboratory of Information & Communication Systems Security

Welcome

Welcome to the home page of the "Info-Sec-Lab" Laboratory of Information & Communication Systems Security, Dept. of Information and Communication Systems Engineering, School of Engineering, University of the Aegean, Greece.





I & CT Security Conferences
AsiaCCS 2017
Submission Deadline: Nov 1, 2016
Call for paper: ACM Asia Conference on Computer and Communications Security
Apr 2, 2017 - Apr 6, 2017
Abu Dhabi, UAE
 
SeMoCloud 2017
Submission Deadline: Nov 15, 2016
The International Workshop on The Security, Privacy, and Digital Forensics of Mobile Cloud
Apr 6, 2017 - Apr 8, 2017
San Francisco
 
IEEE TDSC Journal SI 2016
Submission Deadline: Nov 16, 2016
IEEE TDSC Special Issue on Data-Driven Dependability and Security
N/A
N/A
 
IoTBDS 2017
Submission Deadline: Nov 21, 2016
2nd International Conference on Internet of Things, Big Data and Security
Apr 24, 2017 - Apr 26, 2017
Porto, Portugal
 
JIP SI: Computer Security Technologies 2017
Submission Deadline: Nov 25, 2016
Journal of Information Processing, Special issue of “Computer Security Technologies against Sophisticated Cyber Attacks”
N/A
N/A
 
PETS-Third-Issue 2017
Submission Deadline: Nov 30, 2016
17th Privacy Enhancing Technologies Symposium
Jul 18, 2017 - Jul 21, 2017
Minneapolis, Minnesota, USA
 
Future_Internet-SI 2016
Submission Deadline: Nov 30, 2016
Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
N/A
N/A
 
EmergMediaSec 2016
Submission Deadline: Dec 2, 2016
Special issue on Emerging Challenges and Solutions for Multimedia Security in Advances in Multimedia journal
N/A
N/A
 
ECCWS 2017
Submission Deadline: Dec 8, 2016
16th European Conference on Cyber Warfare and SecurityECCWS 2017
Jun 29, 2017 - Jun 30, 2017
Dublin, Ireland
 
TDSC-PSCE 2017
Submission Deadline: Jan 31, 2017
Special Issue on Paradigm Shifts in Cryptographic Engineering -- IEEE Transactions on Dependable and Secure Computing
N/A
N/A
 
SESCO 2016
Submission Deadline: Jan 31, 2017
Security and sovereignty in the 21st century
Nov 4, 2016 - Nov 6, 2016
Budapest
 
PETS-Fourth-Issue 2017
Submission Deadline: Feb 28, 2017
17th Privacy Enhancing Technologies Symposium
Jul 18, 2017 - Jul 21, 2017
Minneapolis, Minnesota, USA
 
AsiaCCS 2017
Submission Deadline: Nov 1, 2016
Call for paper: ACM Asia Conference on Computer and Communications Security
Apr 2, 2017 - Apr 6, 2017
Abu Dhabi, UAE
 
SeMoCloud 2017
Submission Deadline: Nov 15, 2016
The International Workshop on The Security, Privacy, and Digital Forensics of Mobile Cloud
Apr 6, 2017 - Apr 8, 2017
San Francisco
 
IEEE TDSC Journal SI 2016
Submission Deadline: Nov 16, 2016
IEEE TDSC Special Issue on Data-Driven Dependability and Security
N/A
N/A
 
IoTBDS 2017
Submission Deadline: Nov 21, 2016
2nd International Conference on Internet of Things, Big Data and Security
Apr 24, 2017 - Apr 26, 2017
Porto, Portugal
 
JIP SI: Computer Security Technologies 2017
Submission Deadline: Nov 25, 2016
Journal of Information Processing, Special issue of “Computer Security Technologies against Sophisticated Cyber Attacks”
N/A
N/A
 
PETS-Third-Issue 2017
Submission Deadline: Nov 30, 2016
17th Privacy Enhancing Technologies Symposium
Jul 18, 2017 - Jul 21, 2017
Minneapolis, Minnesota, USA
 
Future_Internet-SI 2016
Submission Deadline: Nov 30, 2016
Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
N/A
N/A
 
EmergMediaSec 2016
Submission Deadline: Dec 2, 2016
Special issue on Emerging Challenges and Solutions for Multimedia Security in Advances in Multimedia journal
N/A
N/A
 
ECCWS 2017
Submission Deadline: Dec 8, 2016
16th European Conference on Cyber Warfare and SecurityECCWS 2017
Jun 29, 2017 - Jun 30, 2017
Dublin, Ireland
 
TDSC-PSCE 2017
Submission Deadline: Jan 31, 2017
Special Issue on Paradigm Shifts in Cryptographic Engineering -- IEEE Transactions on Dependable and Secure Computing
N/A
N/A
 
SESCO 2016
Submission Deadline: Jan 31, 2017
Security and sovereignty in the 21st century
Nov 4, 2016 - Nov 6, 2016
Budapest
 
PETS-Fourth-Issue 2017
Submission Deadline: Feb 28, 2017
17th Privacy Enhancing Technologies Symposium
Jul 18, 2017 - Jul 21, 2017
Minneapolis, Minnesota, USA
 
CyberSec 2017
Submission Deadline: Mar 1, 2017
The Fifth International Conference on Cyber Security, Cyber Welfare and Digital Forensic
Apr 22, 2017 - Apr 24, 2017
St. Mary's University, Ethiopia
 
SMGSSP 2017
Submission Deadline: Jun 15, 2017
Smart Micro-Grid Systems Security and Privacy
Oct 15, 2016 - Mar 31, 2018
Book (Springer)
 

Members
Faculty Members
Postdoctoral Research Fellows
Postgraduate Research Fellows

Publications
Journals
Conferences
Books
Book Chapters
Conference Proceedings Editing

Research Areas

Our main research interests lie in the areas of:

  • Security and Privacy Economics
  • Secure eCommerce, eBusiness, eGovernment, eHealth
  • Privacy Technologies
  • Development of Secure Information Systems
  • Smart Cards Technologies
  • Security and Privacy Legal and Regulatory issues
  • Forensics Investigation; Internet Telephony Security
  • Wireless and Mobile Communications Security
  • Privacy and Trust in Wireless Sensor Networks
  • Security and Privacy in m-health environments
  • Formal Methods for the Analysis and Design of Cryptographic Protocols

Books (in English)
Digital Privacy: Theory, Technologies, and Practices
Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinoudakis, Sabrina De Capitani di Vimercati (Eds.) Auerbach Publications, Taylor and Francis Group, January 2008

Security and Privacy in Mobile and Wireless Networking
Stefanos Gritzalis, Tom Karygiannis, Charalabos Skianis (Eds.) Troubador Publishing Ltd, February 2009


Books (in Greek)
Συγχρονη Κρυπτογραφία - Θεωρία και Εφαρμογές
Mike Burmester - Stefanos Gritzalis - Sokratis Katsikas - Vasileios Chrisikopoulos

Προστασία της Ιδιώτικότητας & Τεχνολογίες Πληροφορικής και Επικοινωνιών
Costas Lambrinoudakis - Lilian Mitrou - Stefanos Gritzalis - Sokratis Katsikas

Ασφάλεια Ασυρμάτων και Κινητών Δικτύων Επικοινωνιών
Georgios Kambourakis - Stefanos Gritzalis - Sokratis Katsikas

Ασφάλεια Δικτύων Υπολογιστών
Stefanos Gritzalis - Sokratis Katsikas - Dimitris Gritzalis

Ασφάλεια Πληροφοριακών Συστημάτων
Sokratis Katsikas - Dimitrios Gritzalis - Stefanos Gritzalis

Projects



News
Leak of 200 Million Yahoo Accounts Linked to 2014 Hack
Posted on Sep 29, 2016

An investigation conducted into the two Yahoo security incidents disclosed recently revealed the existence of a connection and led researchers to believe that the claim of 200 million accounts being stolen in 2012 is likely false.

Virlock Ransomware Spreads User-to-User for Massive Viral Infection
Posted on Sep 28, 2016

Virlock ransomware has hit the scene, with the brand-new capability of infecting every file it comes into contact with.

Dropbox and Microsoft Join Privacy Shield
Posted on Sep 28, 2016

US giants self-certify but doubts persist over its long-term viability

RIG Replaces Neutrino in Massive Malvertising Campaigns
Posted on Sep 28, 2016

The RIG exploit kit (EK) might be moving up the social ladder to become the top threat in its segment and leave Neutrino behind, recently observed malvertising campaigns suggest.

Microsoft AI Tool Helps Devs Spot Bugs
Posted on Sep 28, 2016

Project Springfield is described as a ‘milllion-dollar bug hunter’

Dispel Launches Security-focused Video Conferencing Platform
Posted on Sep 28, 2016

Secure Video Conferencing Solution Protects Content and Metadata in Voice and Video Communication

High Severity DoS Flaw Patched in BIND
Posted on Sep 28, 2016

Updates released this week by the Internet Systems Consortium (ISC) for the DNS software BIND address two vulnerabilities, including a new high-severity issue that can be exploited remotely.

DarkOverlord Extorts WestPark Capital for Ransom
Posted on Sep 28, 2016

The group threatens to release NDAs, contracts, internal reports and other sensitive data belonging to the investment firm.

Locky Ransomware Drops Offline Mode
Posted on Sep 28, 2016

Locky, one of the most prolific ransomware families this year, has changed its modus operandi once again by adopting a new extension that is appended to encrypted files.

Facebook's "Osquery" Security Tool Available for Windows
Posted on Sep 28, 2016

Facebook announced on Tuesday the availability of an osquery version that can be used by security teams to quickly identify and analyze threats on their Windows networks.

Spammers Increasingly Hijacking IPv4 Addresses
Posted on Sep 28, 2016

As new

Cisco Cracks GozNym Trojan DGA, Sinkholes Botnet
Posted on Sep 28, 2016

An extensive analysis of the hybrid Trojan dubbed GozNym has allowed Cisco researchers to reverse engineer its domain generation algorithm (DGA) and start sinkholing botnets that rely on the malware.

Google Launches All-Out War on XSS
Posted on Sep 28, 2016

New tools designed to help developers confound popular attacks

Snowden Again Fails to Win No-extradition Pledge From Norway
Posted on Sep 28, 2016

A Norwegian court on Wednesday dismissed a fresh bid by fugitive whistleblower Edward Snowden to win assurances he would not be extradited to the US should he come to Norway to collect an award.

I Got 99 Problems, But SWEET32 Isn't One
Posted on Sep 28, 2016

Where does SWEET32 rank against other SSL vulnerabilities?&;

Apple Confirms Weakened Security in Local iOS 10 Backups
Posted on Sep 27, 2016

Microsoft and Bank of America Merrill Lynch on Tuesday announced they are working together to make financial transactions more efficient with blockchain technology -- the foundation of bitcoin digital currency.

A Third of Exec Mobiles Are Exposed to Hackers
Posted on Sep 27, 2016

Also, 22.5% of executive devices are infected at some point with at least medium severity malware.

Microsoft Teams with Bank of America on 'Blockchain'
Posted on Sep 27, 2016

Under a plea agreement with prosecutors, Edward Majerczyk admitted to one count of "unauthorized access to a protected computer to obtain information."

GozNym Frankenstein Trojan Has Four Faces
Posted on Sep 27, 2016

Talos identified several spear phishing campaigns which are used to distribute the GozNym malware.

Malvertising Attack Threatens 2 Million answers.com Visitors Daily
Posted on Sep 27, 2016

The attack is making use of the RIG exploit kit to drop the CrypMIC ransomware.


University of the Aegean | Greece

School of Engineering | Information and Communication Systems Engineering

Karlovassi, Samos, 83200, Greece

Email : info-sec-lab@aegean.gr | Fax : +30-22730-82009

ICSD 2008-2015