Contact
University of the Aegean
Department of Information and Communication Systems Engineering
Info Sec Lab
Laboratory of Information & Communication Systems Security

Welcome

Welcome to the home page of the "Info-Sec-Lab" Laboratory of Information & Communication Systems Security, Dept. of Information and Communication Systems Engineering, School of Engineering, University of the Aegean, Greece.





I & CT Security Conferences
SPDF-Mobile 2017
Submission Deadline: Sep 29, 2017
Special Issue on “The Security, Privacy, and Digital Forensics of Mobile Networks and Mobile Cloud”
N/A
N/A
 
SI: MTAP UVS 2017
Submission Deadline: Sep 30, 2017
MTAP Springer Special issue on ‘Ubiquitous Visual Surveillance for Public Security’
Sep 30, 2017 - Sep 30, 2017
NA
 
SPDF-Mobile 2017
Submission Deadline: Sep 29, 2017
Special Issue on “The Security, Privacy, and Digital Forensics of Mobile Networks and Mobile Cloud”
N/A
N/A
 
SI: MTAP UVS 2017
Submission Deadline: Sep 30, 2017
MTAP Springer Special issue on ‘Ubiquitous Visual Surveillance for Public Security’
Sep 30, 2017 - Sep 30, 2017
NA
 
HF 2017
Submission Deadline: Oct 1, 2017
Hackfest.ca 2017 | Canada largest hacking conference
Nov 3, 2017 - Nov 5, 2017
Quebec City, Qc, Canada
 
ASPMI 2018
Submission Deadline: Oct 15, 2017
Advances in Security and Privacy of Multimodal Interfaces
N/A
N/A
 
IoTBDS 2018
Submission Deadline: Oct 16, 2017
3rd International Conference on Internet of Things, Big Data and Security
Mar 19, 2018 - Mar 21, 2018
Funchal, Madeira, Portugal
 
SCN-SPMAP 2017
Submission Deadline: Oct 27, 2017
Security and Communication Networks Journal - SI on Security and Privacy in Mobile Applications and Platforms
N/A
N/A
 
SCN-CyberIoT 2017
Submission Deadline: Oct 27, 2017
Special Issue on Cybersecurity in the Internet of Things - Security and Communication Networks Journal
N/A
N/A
 
SPTE_SC 2017
Submission Deadline: Nov 10, 2017
IJDSN Special Collection on Secure Positioning Technologies for the Emerging Services and Computing Paradigms
N/A
N/A
 
SMDAP_WN 2017
Submission Deadline: Nov 25, 2017
Special Collection on Security Mechanisms and Data Access Protocols in Innovative Wireless Networks - IJDSN (IF: 0.906)
N/A
N/A
 
Future_Internet-SI 2017
Submission Deadline: Nov 30, 2017
Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
N/A
N/A
 
IoT-CyberTrust 2018
Submission Deadline: Dec 1, 2017
IEEE Computer Special Issue on Cybertrust in the IoT Age
N/A
N/A
 
TSEC-NextSecSociety 2017
Submission Deadline: Dec 31, 2017
Journal of Cyber Security Technology Special Issue on Secure Smart Society in Next Generation Networking Paradigm
N/A
N/A
 
FI-IoTSP 2018
Submission Deadline: Feb 28, 2018
Future Internet Journal: Special Issue on IoT Security and Privacy
N/A
N/A
 

Members
Faculty Members
Postdoctoral Research Fellows
Postgraduate Research Fellows

Publications
Journals
Conferences
Books
Book Chapters
Conference Proceedings Editing

Research Areas

Our main research interests lie in the areas of:

  • Security and Privacy Economics
  • Secure eCommerce, eBusiness, eGovernment, eHealth
  • Privacy Technologies
  • Development of Secure Information Systems
  • Smart Cards Technologies
  • Security and Privacy Legal and Regulatory issues
  • Forensics Investigation; Internet Telephony Security
  • Wireless and Mobile Communications Security
  • Privacy and Trust in Wireless Sensor Networks
  • Security and Privacy in m-health environments
  • Formal Methods for the Analysis and Design of Cryptographic Protocols

Books (in English)
Digital Privacy: Theory, Technologies, and Practices
Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinoudakis, Sabrina De Capitani di Vimercati (Eds.) Auerbach Publications, Taylor and Francis Group, January 2008

Security and Privacy in Mobile and Wireless Networking
Stefanos Gritzalis, Tom Karygiannis, Charalabos Skianis (Eds.) Troubador Publishing Ltd, February 2009


Books (in Greek)
Συγχρονη Κρυπτογραφία - Θεωρία και Εφαρμογές
Mike Burmester - Stefanos Gritzalis - Sokratis Katsikas - Vasileios Chrisikopoulos

Προστασία της Ιδιώτικότητας & Τεχνολογίες Πληροφορικής και Επικοινωνιών
Costas Lambrinoudakis - Lilian Mitrou - Stefanos Gritzalis - Sokratis Katsikas

Ασφάλεια Ασυρμάτων και Κινητών Δικτύων Επικοινωνιών
Georgios Kambourakis - Stefanos Gritzalis - Sokratis Katsikas

Ασφάλεια Δικτύων Υπολογιστών
Stefanos Gritzalis - Sokratis Katsikas - Dimitris Gritzalis

Ασφάλεια Πληροφοριακών Συστημάτων
Sokratis Katsikas - Dimitrios Gritzalis - Stefanos Gritzalis

Projects



News
Multiple Zero-days Disclosed in Western Digital NAS Storage Devices
Posted on Mar 06, 2017

The Western Digital My Cloud range of storage devices, ranging from consumer products with up to 16TB storage (My Cloud Mirror) to business devices with up to 32TB storage (My Cloud Pro and My Cloud Expert) contain multiple firmware vulnerabilities that can be exploited remotely.

One Million Stolen Gmail & Yahoo Accounts for Sale on Dark Web
Posted on Mar 06, 2017

The accounts include names, emails and plain text passwords harvested from a variety of infamous data breaches

Twitter Flaw Allowed Access to Locked Accounts
Posted on Mar 06, 2017

Rockstar Games this week launched a public bug bounty program through HackerOne, after running it in private mode for more than nine months.

#GartnerIAM: Tackle GDPR Compliance with Risk Management
Posted on Mar 06, 2017

Gartner claims that despite low take up, GDPR compliance is not a lost cause

RDP Tops Email for Ransomware Distribution: Report
Posted on Mar 06, 2017

A company run by a couple of known spammers has unknowingly leaked a series of files containing sensitive information about its operations, including nearly 1.4 billion user records.

Shellshock Attacks Still Cheap and Easy: IBM
Posted on Mar 06, 2017

Researchers at Kaspersky Lab have come across a new and sophisticated piece of malware that can be used for both cyber espionage and wiping an infected computer’s storage.

HackerOne Offers Free Bounty Programs for Open Source
Posted on Mar 06, 2017

In the wake of high-profile open-source flaws like Heartbleed and Poodle, there’s an awareness that most of the tools and technology that we use every day run on open-source platforms.

Temporary Fix Available for Windows GDI Vulnerability
Posted on Mar 06, 2017

Two and a half years after being discovered, the Shellshock vulnerability continues to be abused in attacks, and for a good reason: it is a very cheap and easy attack, IBM says.

#GartnerIAM: Analytics in IAM Enable Security
Posted on Mar 06, 2017

A lot of negativity in security can be compounded with positivity of the future of IAM and analytics

Consumer Reports Debuts Impartial Privacy Standard
Posted on Mar 06, 2017

It can be used by businesses to measure the privacy and security of products, apps and services.

From Automation to Intelligence - Humans Needed
Posted on Mar 06, 2017

In February 2017, endpoint protection firm CrowdStrike took the unusual step of suing independent product testing organization NSS Labs, "to hold it accountable for unlawfully accessing our software, breaching our contract, pirating our software, and improper security testing."

Nurse Fined After Admitting to Accessing Patient Records
Posted on Mar 06, 2017

Nurse Elaine Lewis was dismissed from role after admitting breaching the Data Protection Act

CrowdStrike Vs NSS Labs, Round 2: NSS Hits Back
Posted on Mar 06, 2017

The security industry wrapped up what has arguably become the most significant trade show in the security industry: RSA Conference. While it’s always interesting to see what challenges hold the industry’s attention and how vendors plan to address them, I find the most useful information comes from informal conversations with customers and industry colleagues as opposed to official booth presentations.

Spammers Leak 1.4 Billion User Records
Posted on Mar 06, 2017

Twitter was until a few months ago affected by a vulnerability that could have been exploited to bypass the social media network’s account locking mechanism.

Shamoon-Linked "StoneDrill" Malware Allows Spying, Destruction
Posted on Mar 06, 2017

When Data Isn’t Keenly Analyzed to Raise it to the Level of Finished Intelligence, it Can Only Answer the Questions an Organization Knows to Ask

Slack hack threatened to expose user account data and messages
Posted on Mar 03, 2017

A new cybersecurity report used a hacker survey to offer a perspective on IT that can often be overlooked and found there may not be any easy answers.

Project Zero discovers Cloudflare bug leaking sensitive customer data
Posted on Mar 03, 2017

A new cybersecurity report used a hacker survey to offer a perspective on IT that can often be overlooked and found there may not be any easy answers.

Edge and IE vulnerability disclosed by Project Zero
Posted on Mar 03, 2017

A new cybersecurity report used a hacker survey to offer a perspective on IT that can often be overlooked and found there may not be any easy answers.

Using Cyber Threat Intelligence to Understand the Cyber Extortion Epidemic
Posted on Mar 03, 2017

Chinese VoIP Kit Contains Backdoor, Warn Researchers
Posted on Mar 03, 2017

Shenzhen-based DBL Technology patched but did not fix issue


University of the Aegean | Greece

School of Engineering | Information and Communication Systems Engineering

Karlovassi, Samos, 83200, Greece

Email : info-sec-lab@aegean.gr | Fax : +30-22730-82009

ICSD 2008-2015