Contact
University of the Aegean
Department of Information and Communication Systems Engineering
Info Sec Lab
Laboratory of Information & Communication Systems Security

Welcome

Welcome to the home page of the "Info-Sec-Lab" Laboratory of Information & Communication Systems Security, Dept. of Information and Communication Systems Engineering, School of Engineering, University of the Aegean, Greece.





I & CT Security Conferences
MobiSec 2017
Submission Deadline: Jan 10, 2017
IEEE INFOCOM - The International Workshop on The Security, Privacy, and Digital Forensics of Mobile Systems and Networks
May 1, 2017 - May 1, 2017
Atlanta, Georgia
 
CPSS 2017
Submission Deadline: Jan 12, 2017
3rd ACM Cyber‐Physical System Security Workshop
Apr 2, 2017 - Apr 2, 2017
Abu Dhabi, UAE
 
MobiSec 2017
Submission Deadline: Jan 10, 2017
IEEE INFOCOM - The International Workshop on The Security, Privacy, and Digital Forensics of Mobile Systems and Networks
May 1, 2017 - May 1, 2017
Atlanta, Georgia
 
CPSS 2017
Submission Deadline: Jan 12, 2017
3rd ACM Cyber‐Physical System Security Workshop
Apr 2, 2017 - Apr 2, 2017
Abu Dhabi, UAE
 
AnnualSec 2017
Submission Deadline: Jan 15, 2017
16th Annual Security Conference
Apr 18, 2017 - Apr 20, 2017
Las Vegas
 
SEPRICC 2017
Submission Deadline: Jan 15, 2017
Security and Privacy in Cloud Computing
Feb 19, 2017 - Feb 23, 2017
Athens, Greece
 
SCC 2017
Submission Deadline: Jan 20, 2017
AsiaCCS-SCC - The Fifth International Workshop on Security in Cloud Computing (SCC), April, 2017, Abu Dhabi, UAE
Apr 2, 2017 - Apr 2, 2017
Abu Dhabi, UAE
 
HACKSI 2017
Submission Deadline: Jan 28, 2017
Second Digital Congress of Spanish Speaking on Hacking and Computer Security
Feb 25, 2017 - Feb 26, 2017
World
 
TDSC-PSCE 2017
Submission Deadline: Jan 31, 2017
Special Issue on Paradigm Shifts in Cryptographic Engineering -- IEEE Transactions on Dependable and Secure Computing
N/A
N/A
 
SESCO 2016
Submission Deadline: Jan 31, 2017
Security and sovereignty in the 21st century
Nov 4, 2016 - Nov 6, 2016
Budapest
 
ACISP 2017
Submission Deadline: Feb 26, 2017
Australasian Conference on Information Security and Privacy
Jul 3, 2017 - Jul 5, 2017
Auckland, New Zealand
 
PETS-Fourth-Issue 2017
Submission Deadline: Feb 28, 2017
17th Privacy Enhancing Technologies Symposium
Jul 18, 2017 - Jul 21, 2017
Minneapolis, Minnesota, USA
 
CyberSec 2017
Submission Deadline: Mar 1, 2017
The Fifth International Conference on Cyber Security, Cyber Welfare and Digital Forensic
Apr 22, 2017 - Apr 24, 2017
St. Mary's University, Ethiopia
 
TrustCom 2017
Submission Deadline: Mar 1, 2017
16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
Aug 1, 2017 - Aug 4, 2017
Sydney, Australia
 
IWSEC 2017
Submission Deadline: Mar 3, 2017
International Workshop on Security
Aug 30, 2017 - Sep 1, 2017
Hiroshima, Japan
 
SOUPS 2017
Submission Deadline: Mar 7, 2017
Symposium on Usable Privacy and Security
Jul 12, 2017 - Jul 14, 2017
Santa Clara, CA
 
AnnualSec 2017
Submission Deadline: Jan 15, 2017
16th Annual Security Conference
Apr 18, 2017 - Apr 20, 2017
Las Vegas
 
SEPRICC 2017
Submission Deadline: Jan 15, 2017
Security and Privacy in Cloud Computing
Feb 19, 2017 - Feb 23, 2017
Athens, Greece
 
SCC 2017
Submission Deadline: Jan 20, 2017
AsiaCCS-SCC - The Fifth International Workshop on Security in Cloud Computing (SCC), April, 2017, Abu Dhabi, UAE
Apr 2, 2017 - Apr 2, 2017
Abu Dhabi, UAE
 
HACKSI 2017
Submission Deadline: Jan 28, 2017
Second Digital Congress of Spanish Speaking on Hacking and Computer Security
Feb 25, 2017 - Feb 26, 2017
World
 
TDSC-PSCE 2017
Submission Deadline: Jan 31, 2017
Special Issue on Paradigm Shifts in Cryptographic Engineering -- IEEE Transactions on Dependable and Secure Computing
N/A
N/A
 
SESCO 2016
Submission Deadline: Jan 31, 2017
Security and sovereignty in the 21st century
Nov 4, 2016 - Nov 6, 2016
Budapest
 
ACISP 2017
Submission Deadline: Feb 26, 2017
Australasian Conference on Information Security and Privacy
Jul 3, 2017 - Jul 5, 2017
Auckland, New Zealand
 
PETS-Fourth-Issue 2017
Submission Deadline: Feb 28, 2017
17th Privacy Enhancing Technologies Symposium
Jul 18, 2017 - Jul 21, 2017
Minneapolis, Minnesota, USA
 
CyberSec 2017
Submission Deadline: Mar 1, 2017
The Fifth International Conference on Cyber Security, Cyber Welfare and Digital Forensic
Apr 22, 2017 - Apr 24, 2017
St. Mary's University, Ethiopia
 
TrustCom 2017
Submission Deadline: Mar 1, 2017
16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
Aug 1, 2017 - Aug 4, 2017
Sydney, Australia
 
IWSEC 2017
Submission Deadline: Mar 3, 2017
International Workshop on Security
Aug 30, 2017 - Sep 1, 2017
Hiroshima, Japan
 
SOUPS 2017
Submission Deadline: Mar 7, 2017
Symposium on Usable Privacy and Security
Jul 12, 2017 - Jul 14, 2017
Santa Clara, CA
 
MSPN 2017
Submission Deadline: Apr 20, 2017
International Conference on Mobile, Secure and Programmable Networking
Jun 29, 2017 - Jun 30, 2017
Paris
 
Games-SI:DMNSP 2017
Submission Deadline: Apr 30, 2017
Games Special Issue on Decision Making for Network Security and Privacy.
N/A
N/A
 
DASC 2017
Submission Deadline: Apr 30, 2017
The 15th IEEE International Conference on Dependable, Autonomic and Secure Computing
Nov 6, 2017 - Nov 10, 2017
Orlando - Florida USA
 
INSERT 2017
Submission Deadline: May 1, 2017
1st International Conference on Security, Privacy, and Trust (INSERT'17)
Sep 4, 2017 - Sep 7, 2017
Prague, Czech Republic
 
SI: Security-BD-SmartCity 2017
Submission Deadline: May 1, 2017
Special Issue on Security and Privacy in Big Data-enabled Smart Cities: Opportunities and Challenges
N/A
N/A
 
EuropeanSeC 2017
Submission Deadline: May 9, 2017
2017 European Security Conference
Jun 5, 2017 - Jun 6, 2017
Lisbon
 
SMGSSP 2017
Submission Deadline: Jun 15, 2017
Smart Micro-Grid Systems Security and Privacy
Nov 15, 2016 - Mar 31, 2018
Book (Springer)
 

Members
Faculty Members
Postdoctoral Research Fellows
Postgraduate Research Fellows

Publications
Journals
Conferences
Books
Book Chapters
Conference Proceedings Editing

Research Areas

Our main research interests lie in the areas of:

  • Security and Privacy Economics
  • Secure eCommerce, eBusiness, eGovernment, eHealth
  • Privacy Technologies
  • Development of Secure Information Systems
  • Smart Cards Technologies
  • Security and Privacy Legal and Regulatory issues
  • Forensics Investigation; Internet Telephony Security
  • Wireless and Mobile Communications Security
  • Privacy and Trust in Wireless Sensor Networks
  • Security and Privacy in m-health environments
  • Formal Methods for the Analysis and Design of Cryptographic Protocols

Books (in English)
Digital Privacy: Theory, Technologies, and Practices
Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinoudakis, Sabrina De Capitani di Vimercati (Eds.) Auerbach Publications, Taylor and Francis Group, January 2008

Security and Privacy in Mobile and Wireless Networking
Stefanos Gritzalis, Tom Karygiannis, Charalabos Skianis (Eds.) Troubador Publishing Ltd, February 2009


Books (in Greek)
Συγχρονη Κρυπτογραφία - Θεωρία και Εφαρμογές
Mike Burmester - Stefanos Gritzalis - Sokratis Katsikas - Vasileios Chrisikopoulos

Προστασία της Ιδιώτικότητας & Τεχνολογίες Πληροφορικής και Επικοινωνιών
Costas Lambrinoudakis - Lilian Mitrou - Stefanos Gritzalis - Sokratis Katsikas

Ασφάλεια Ασυρμάτων και Κινητών Δικτύων Επικοινωνιών
Georgios Kambourakis - Stefanos Gritzalis - Sokratis Katsikas

Ασφάλεια Δικτύων Υπολογιστών
Stefanos Gritzalis - Sokratis Katsikas - Dimitris Gritzalis

Ασφάλεια Πληροφοριακών Συστημάτων
Sokratis Katsikas - Dimitrios Gritzalis - Stefanos Gritzalis

Projects



News
Backdoor Found in Many Sony Security Cameras
Posted on Dec 06, 2016

Data breach notification service LeakedSource has obtained a database containing the details of roughly 85 million Dailymotion users, including usernames, email addresses and, in many cases, passwords.

'Spy' Toys Face Complaints From EU, US Watchdogs
Posted on Dec 06, 2016

I’m often asked why I run a team entirely dedicated to researching, developing and implementing various program frameworks – when so many security organizations get by just fine without them. However, the phrase “get by just fine without them” is part of the answer. The challenge with helping security leaders and professionals understand why what they’re doing requires a model to follow when there are few visible consequences to simply winging it.

(ISC)² Announces 2017 Board Members
Posted on Dec 06, 2016

The 13-member board provides strategy, governance and oversight, grants certifications and enforces the ethics code.

Putin Approves New Cybersecurity Doctrine
Posted on Dec 06, 2016

Nintendo announced on Monday the launch of a new bug bounty program for its 3DS handheld gaming systems. The company is prepared to offer between $100 and $20,000 for vulnerabilities found in the product.

Optiv Security to Be Acquired By Private Equity Firm KKR
Posted on Dec 06, 2016

Russian President Vladimir Putin on Tuesday signed off on a broad-ranging plan aimed at bolstering the country's defenses against cyberattacks from abroad and cracking down on perceived foreign influence.

Flash Player Remains Main Target of Exploit Kits: Report
Posted on Dec 06, 2016

Optiv Security, the cyber security company

100,000 UK Routers Likely Affected by Mirai Variant
Posted on Dec 06, 2016

Approximately 100,000 UK TalkTalk and Post Office ISP users were affected by the recent

Daily Motion Breach: 86 Million Accounts Compromised
Posted on Dec 06, 2016

Video sharing site is latest to fall victim

The Importance of Security Frameworks
Posted on Dec 06, 2016

Sony has released firmware updates for many of its security cameras to address a critical vulnerability that can be exploited to take control of the devices, including by botnets such as Mirai.

New Ransomware Families to Rise 25% in 2017
Posted on Dec 06, 2016

Trend Micro report claims hackers will diversify to compete

IBM Watson Moves into Commercial Testing
Posted on Dec 05, 2016

After training for a year on the language of cybersecurity, the AI engine is entering a beta phase with 40+ security teams.

State-owned Russian Bank VTB Says Sites Hit by Cyberattack
Posted on Dec 05, 2016

Saudi Arabia’s General Authority of Civil Aviation (GACA) has confirmed that several government agencies, including its own systems, have been hit by the recent Shamoon 2.0 attacks, but downplayed the impact of the incident.

WordPress to Require Hosts to Support HTTPS
Posted on Dec 05, 2016

10 Days of DDoS: an Actor’s "Working" Hours
Posted on Dec 05, 2016

Car Dealer Accused of Stealing Pastor’s Nude Pics
Posted on Dec 05, 2016

Report claims he sent photos of cleric’s wife to swingers’ site

Malaysia to Establish Cybersecurity Academy
Posted on Dec 05, 2016

The Malaysian Digital Economic Corporation (MDEC) and PGI will develop a cybersecurity academy in Malaysia.

Researchers Warn of Visa Payment Fraud Gaps
Posted on Dec 05, 2016

They were able to work out CV2 and expiry dates in six seconds

One-Fifth of Government Agencies Don't Encrypt Data
Posted on Dec 05, 2016

Respondents still prioritize security as the top concern, followed by cost.

Saudi Aviation Agency Downplays Impact of Shamoon Attack
Posted on Dec 05, 2016

In an attempt to provide increased security and privacy for its users, WordPress has announced that upcoming features will require hosts to support HTTPS.

Health Solutions Exposes 43K Sensitive Pathology Records
Posted on Dec 05, 2016

Among the data are HIV test results and affected individuals as young as 17; the company didn’t want to take responsibility.


University of the Aegean | Greece

School of Engineering | Information and Communication Systems Engineering

Karlovassi, Samos, 83200, Greece

Email : info-sec-lab@aegean.gr | Fax : +30-22730-82009

ICSD 2008-2015