Contact
University of the Aegean
Department of Information and Communication Systems Engineering
Info Sec Lab
Laboratory of Information & Communication Systems Security

Welcome

Welcome to the home page of the "Info-Sec-Lab" Laboratory of Information & Communication Systems Security, Dept. of Information and Communication Systems Engineering, School of Engineering, University of the Aegean, Greece.




I & CT Security Conferences
ICISSP 2020
Submission Deadline: Nov 15, 2019
6th International Conference on Information Systems Security and Privacy
Feb 25, 2020 - Feb 27, 2020
Valletta, Malta
 
IEEE Euro S&P 2020
Submission Deadline: Nov 20, 2019
5th IEEE European Symposium on Security and Privacy
Jun 16, 2020 - Jun 18, 2020
Genova, Italy
 
IFIP SEC 2020
Submission Deadline: Dec 1, 2019
35th IFIP TC-11 SEC 2020 International Information Security and Privacy Conference
May 26, 2020 - May 28, 2020
Maribor, Slovenia
 
ECCWS 2020
Submission Deadline: Dec 4, 2019
19th European Conference on Cyber Warfare and Security
Jun 25, 2020 - Jun 25, 2020
Chester, UK
 
ASIACCS 2020
Submission Deadline: Dec 10, 2019
ACM ASIACCS 2020 : The 15th ACM ASIA Conference on Computer and Communications Security
Jun 1, 2020 - Jun 5, 2020
Taipei, Taiwan
 
BSP-IoT 2020
Submission Deadline: Dec 15, 2019
Blockchain Security and Privacy for the Internet of Things
N/A
N/A
 
PS-LOC 2020
Submission Deadline: Dec 15, 2019
Special Issue on Privacy and Security for Location-based Services and Devices
N/A
N/A
 
IPASMIT 2020
Submission Deadline: Dec 30, 2019
Intelligent Perception, Application and Security Mechanism in the Internet of Things
N/A
N/A
 
ICISSP 2020
Submission Deadline: Nov 15, 2019
6th International Conference on Information Systems Security and Privacy
Feb 25, 2020 - Feb 27, 2020
Valletta, Malta
 
IEEE Euro S&P 2020
Submission Deadline: Nov 20, 2019
5th IEEE European Symposium on Security and Privacy
Jun 16, 2020 - Jun 18, 2020
Genova, Italy
 
IFIP SEC 2020
Submission Deadline: Dec 1, 2019
35th IFIP TC-11 SEC 2020 International Information Security and Privacy Conference
May 26, 2020 - May 28, 2020
Maribor, Slovenia
 
ECCWS 2020
Submission Deadline: Dec 4, 2019
19th European Conference on Cyber Warfare and Security
Jun 25, 2020 - Jun 25, 2020
Chester, UK
 
ASIACCS 2020
Submission Deadline: Dec 10, 2019
ACM ASIACCS 2020 : The 15th ACM ASIA Conference on Computer and Communications Security
Jun 1, 2020 - Jun 5, 2020
Taipei, Taiwan
 
BSP-IoT 2020
Submission Deadline: Dec 15, 2019
Blockchain Security and Privacy for the Internet of Things
N/A
N/A
 
PS-LOC 2020
Submission Deadline: Dec 15, 2019
Special Issue on Privacy and Security for Location-based Services and Devices
N/A
N/A
 
IPASMIT 2020
Submission Deadline: Dec 30, 2019
Intelligent Perception, Application and Security Mechanism in the Internet of Things
N/A
N/A
 
Cyber Security 2020
Submission Deadline: Jan 26, 2020
IEEE International Conference on Cyber Security and Protection of Digital Services
Jun 15, 2002 - Jun 17, 2020
Dublin
 
IoTBDS 2020
Submission Deadline: Jan 29, 2020
5th International Conference on Internet of Things, Big Data and Security
May 7, 2020 - May 9, 2020
Prague, Czech Republic
 
Cognitive Computing 2020
Submission Deadline: Jan 30, 2020
Cognitive Computing with Big Data System over Secure Internet of Things
N/A
N/A
 
SP 2020
Submission Deadline: Feb 1, 2020
IEEE Symposium on Security and Privacy
May 18, 2020 - May 20, 2020
HYATT REGENCY, SAN FRANCISCO, CA
 
DASC 2020
Submission Deadline: Feb 15, 2020
The 18th IEEE Int’l Conference on Dependable, Autonomic and Secure Computing
Jun 22, 2020 - Jun 26, 2020
Calgary, Canada
 
IEEE COINS 2020
Submission Deadline: Mar 6, 2020
Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
Jul 27, 2020 - Jul 29, 2020
Barcelona, Spain
 
CPCS 2020
Submission Deadline: Apr 15, 2020
Call for Chapters: Security and Privacy in Cyber-Physical Systems: Threats and Defenses
Oct 1, 2019 - Jul 15, 2020
Book
 
CSW 2021
Submission Deadline: May 31, 2020
2021 International Workshop on Cyber Security (CSW 2021)
Aug 13, 2021 - Aug 15, 2021
Stockholm, Sweden
 

Members
Faculty Members
Postdoctoral Research Fellows
Postgraduate Research Fellows

Publications
Journals
Conferences
Books
Book Chapters
Conference Proceedings Editing

Research Areas

Our main research interests lie in the areas of:

  • Security and Privacy Economics
  • Secure eCommerce, eBusiness, eGovernment, eHealth
  • Privacy Technologies
  • Development of Secure Information Systems
  • Smart Cards Technologies
  • Security and Privacy Legal and Regulatory issues
  • Forensics Investigation; Internet Telephony Security
  • Wireless and Mobile Communications Security
  • Privacy and Trust in Wireless Sensor Networks
  • Security and Privacy in m-health environments
  • Formal Methods for the Analysis and Design of Cryptographic Protocols

Books (in English)
Digital Privacy: Theory, Technologies, and Practices
Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinoudakis, Sabrina De Capitani di Vimercati (Eds.) Auerbach Publications, Taylor and Francis Group, January 2008

Security and Privacy in Mobile and Wireless Networking
Stefanos Gritzalis, Tom Karygiannis, Charalabos Skianis (Eds.) Troubador Publishing Ltd, February 2009

Intrusion Detection and Prevention for Mobile Ecosystems
Georgios Kambourakis, Asaf Shabtai, Constantinos Kolias, Dimitrios Damopoulos (Eds.), CRC Press, September 2017.


Books (in Greek)
Συγχρονη Κρυπτογραφία - Θεωρία και Εφαρμογές
Mike Burmester - Stefanos Gritzalis - Sokratis Katsikas - Vasileios Chrisikopoulos

Προστασία της Ιδιώτικότητας & Τεχνολογίες Πληροφορικής και Επικοινωνιών
Costas Lambrinoudakis - Lilian Mitrou - Stefanos Gritzalis - Sokratis Katsikas

Ασφάλεια Ασυρμάτων και Κινητών Δικτύων Επικοινωνιών
Georgios Kambourakis - Stefanos Gritzalis - Sokratis Katsikas

Ασφάλεια Δικτύων Υπολογιστών
Stefanos Gritzalis - Sokratis Katsikas - Dimitris Gritzalis

Ασφάλεια Πληροφοριακών Συστημάτων
Sokratis Katsikas - Dimitrios Gritzalis - Stefanos Gritzalis

Projects



News
Thoma Bravo to Acquire Sophos for $3.9 Billion
Posted on Oct 14, 2019

Private equity investment firm Thoma Bravo has made an offer to acquire UK-based cybersecurity firm Sophos for $3.9 billion.

Majority of Simjacker Attacks Aimed at Mobile Phones in Mexico
Posted on Oct 14, 2019

Researchers believe hundreds of millions of SIM cards may be vulnerable to Simjacker attacks after determining that the targeted technology, despite being very old, is still used by at least 61 mobile operators across 29 countries.

Amazon Calls for Government Regulation of Facial Recognition Tech
Posted on Oct 14, 2019

Imperva has shared more information on how hackers managed to obtain information on Cloud Web Application Firewall (WAF) customers, and revealed that the incident involved a compromised administrative API key.

Microsoft and NIST Team Up on Patching Guide
Posted on Oct 14, 2019

Initiative will produce common reference architectures and processes

Scottish Teens Charged With Met Police Hack
Posted on Oct 14, 2019

Police force’s news platform was compromised in July

Stolen Cloud API Key to Blame for Imperva Breach
Posted on Oct 14, 2019

Security firm comes clean over compromise

Critical Flaw in Sophos Cyberoam Appliances Allows Remote Code Execution
Posted on Oct 14, 2019

A critical vulnerability patched recently by Sophos in its Cyberoam firewall appliances allows a remote, unauthenticated attacker to execute arbitrary commands with root privileges.

Why All Security Disciplines Should Use the Intelligence Cycle
Posted on Oct 14, 2019

The intelligence cycle is often underutilized in nearly every area of security. This iterative process through which data or information becomes intelligence can streamline, focus, and provide strategic guidance in myriad situations that extend far beyond the realm of traditional intelligence operations. But despite these benefits, in most cases (at least in the commercial sector), usage of the intelligence cycle is limited to threat intelligence programs.&;

Compromised AWS API Key Allowed Access to Imperva Customer Data
Posted on Oct 14, 2019

The announcement was made on Monday and Sophos said its board of directors will “unanimously recommend the offer to the company’s shareholders.”

Alleged Hacker Arraigned on $1.4 Million Cryptocurrency Fraud Charges
Posted on Oct 14, 2019

A Michigan man appeared in federal court on Friday on charges related to his involvement in a scheme aimed at defrauding victims of at least $1.4 million in cryptocurrency.

#SecTorCa: Millions of Phones Leaking Information Via Tor
Posted on Oct 11, 2019

Researchers claim 30% of all Android devices are transmitting data that could be used to track and profile users

NIST and Microsoft Partner to Improve Enterprise Patching Strategies
Posted on Oct 11, 2019

An Alabama hospital chain that quit accepting new patients

Hospitals Resume Accepting Patients After Malware Attack
Posted on Oct 11, 2019

Google this week announced an update for Chrome 77 that addresses 8 security vulnerabilities in the application, including 5 reported by external researchers.

Mississippi Shows Flagrant Disregard for Cybersecurity
Posted on Oct 11, 2019

Audit reveals Mississippi government institutions are not following cybersecurity laws

#SecTorCa: Finding a New Route to Solve Tomorrow’s Cyber-Attacks
Posted on Oct 11, 2019

Detection is no longer the right way to defend an enterprise

Most Americans Are Clueless About Private Browsing
Posted on Oct 11, 2019

New research reveals a dearth of digital knowledge among American adults

BAE Systems Pilots Tech to Support Child Protection Agencies
Posted on Oct 11, 2019

Tech aims to quickly and accurately bring together data relating to vulnerable children

Magecart Attack on eCommerce Platform Hits Thousands of Online Shops
Posted on Oct 11, 2019

Blockchain, or distributed ledger, is sometimes described as a 'solution in search of a problem'. There are many valid applications outside of pure cybersecurity -- for example, reducing transaction costs in complex legal situations like house purchase, or tracking the location of physical goods in distribution or supply chains -- but improving cybersecurity has had few valid and proven proposals.

Google Patches 8 Vulnerabilities in Chrome 77
Posted on Oct 11, 2019

A recently uncovered highly targeted cyber-espionage platform that uses Tor for network communication has remained under the radar for at least six years, ESET reports.

US Homeland Security Wants to Subpoena ISPs to Hand Over Data
Posted on Oct 11, 2019

CISA has requested subpoena power to make sending vulnerability warnings easier


University of the Aegean | Greece

School of Engineering | Information and Communication Systems Engineering

Karlovassi, Samos, 83200, Greece

Email : info-sec-lab@aegean.gr | Fax : +30-22730-82009

ICSD 2008-2019