Contact
University of the Aegean
Department of Information and Communication Systems Engineering
Info Sec Lab
Laboratory of Information & Communication Systems Security

Welcome

Welcome to the home page of the "Info-Sec-Lab" Laboratory of Information & Communication Systems Security, Dept. of Information and Communication Systems Engineering, School of Engineering, University of the Aegean, Greece.




I & CT Security Conferences
ESORICS 2019
Submission Deadline: Apr 22, 2019
The 24th European Symposium on Research in Computer Security
Sep 23, 2019 - Sep 27, 2019
Luxembourg
 
CSNet 2019
Submission Deadline: Apr 28, 2019
3rd Cyber Security in Networking Conference
Oct 23, 2019 - Oct 25, 2019
Quito, Ecuador
 
ESORICS 2019
Submission Deadline: Apr 22, 2019
The 24th European Symposium on Research in Computer Security
Sep 23, 2019 - Sep 27, 2019
Luxembourg
 
CSNet 2019
Submission Deadline: Apr 28, 2019
3rd Cyber Security in Networking Conference
Oct 23, 2019 - Oct 25, 2019
Quito, Ecuador
 
JDST - no. 3 2019
Submission Deadline: Apr 30, 2019
Journal of Defence & Security Technologies: Defence Technology Foresight
N/A
N/A
 
LPW 2019
Submission Deadline: Apr 30, 2019
Location Privacy Workshop
Aug 26, 2019 - Aug 29, 2019
Canterbury, UK
 
Cybersecurity 2019
Submission Deadline: May 10, 2019
The 8th International Workshop on Cyber Security and Privacy
Oct 17, 2019 - Oct 19, 2019
Guilin, China
 
CCS - May 2019
Submission Deadline: May 15, 2019
CCS 2019 : 26th ACM Conference on Computer and Communications Security - May Deadline
Nov 11, 2019 - Nov 15, 2019
London
 
ISPEC 2019
Submission Deadline: Jun 8, 2019
The 15th International Conference on Information Security Practice and Experience
Nov 26, 2019 - Nov 28, 2019
Kuala Lumpur, Malaysia
 
VizSec 2019
Submission Deadline: Jun 15, 2019
16th IEEE Symposium on Visualization for Cyber Security
Oct 23, 2019 - Oct 23, 2019
Vancouver, Canada
 
CECC 2019
Submission Deadline: Jun 17, 2019
Central European Cybersecurity Conference
Nov 15, 2019 - Nov 16, 2019
Munich, Germany
 
SECURWARE 2019
Submission Deadline: Jun 18, 2019
The Thirteenth International Conference on Emerging Security Information, Systems and Technologies
Oct 27, 2019 - Oct 31, 2019
Nice, France
 
TCPS-SPCCPS 2019
Submission Deadline: Jun 30, 2019
ACM Transactions on Cyber-Physical Systems (TCPS), Special Issue on Security and Privacy for Connected Cyber-Physical Systems
N/A
N/A
 
B-Sides MSP 2019
Submission Deadline: Jul 1, 2019
Security B-Sides MSP 2019
Sep 26, 2019 - Sep 28, 2019
Minneapolis, Minnesota
 
JDST - no. 3 2019
Submission Deadline: Apr 30, 2019
Journal of Defence & Security Technologies: Defence Technology Foresight
N/A
N/A
 
LPW 2019
Submission Deadline: Apr 30, 2019
Location Privacy Workshop
Aug 26, 2019 - Aug 29, 2019
Canterbury, UK
 
Cybersecurity 2019
Submission Deadline: May 10, 2019
The 8th International Workshop on Cyber Security and Privacy
Oct 17, 2019 - Oct 19, 2019
Guilin, China
 
CCS - May 2019
Submission Deadline: May 15, 2019
CCS 2019 : 26th ACM Conference on Computer and Communications Security - May Deadline
Nov 11, 2019 - Nov 15, 2019
London
 
ISPEC 2019
Submission Deadline: Jun 8, 2019
The 15th International Conference on Information Security Practice and Experience
Nov 26, 2019 - Nov 28, 2019
Kuala Lumpur, Malaysia
 
VizSec 2019
Submission Deadline: Jun 15, 2019
16th IEEE Symposium on Visualization for Cyber Security
Oct 23, 2019 - Oct 23, 2019
Vancouver, Canada
 
CECC 2019
Submission Deadline: Jun 17, 2019
Central European Cybersecurity Conference
Nov 15, 2019 - Nov 16, 2019
Munich, Germany
 
SECURWARE 2019
Submission Deadline: Jun 18, 2019
The Thirteenth International Conference on Emerging Security Information, Systems and Technologies
Oct 27, 2019 - Oct 31, 2019
Nice, France
 
TCPS-SPCCPS 2019
Submission Deadline: Jun 30, 2019
ACM Transactions on Cyber-Physical Systems (TCPS), Special Issue on Security and Privacy for Connected Cyber-Physical Systems
N/A
N/A
 
B-Sides MSP 2019
Submission Deadline: Jul 1, 2019
Security B-Sides MSP 2019
Sep 26, 2019 - Sep 28, 2019
Minneapolis, Minnesota
 
RASPSS 2019
Submission Deadline: Jul 31, 2019
CCPE Special Issue on Recent Advance in Security and Privacy for Smart Society (RASPSS19)
Jan 1, 2019 - Jul 31, 2019
N/A
 
SPT-SN-IoT 2019
Submission Deadline: Aug 15, 2019
Special Issue Security, Privacy, and Trustworthiness of Sensor Networks and Internet of Things
N/A
N/A
 
BSidesTLH 2020
Submission Deadline: Oct 31, 2019
BSides Tallahassee 2020 Security Conference
Jan 11, 2020 - Jan 11, 2020
Tallahassee, FL
 

Members
Faculty Members
Postdoctoral Research Fellows
Postgraduate Research Fellows

Publications
Journals
Conferences
Books
Book Chapters
Conference Proceedings Editing

Research Areas

Our main research interests lie in the areas of:

  • Security and Privacy Economics
  • Secure eCommerce, eBusiness, eGovernment, eHealth
  • Privacy Technologies
  • Development of Secure Information Systems
  • Smart Cards Technologies
  • Security and Privacy Legal and Regulatory issues
  • Forensics Investigation; Internet Telephony Security
  • Wireless and Mobile Communications Security
  • Privacy and Trust in Wireless Sensor Networks
  • Security and Privacy in m-health environments
  • Formal Methods for the Analysis and Design of Cryptographic Protocols

Books (in English)
Digital Privacy: Theory, Technologies, and Practices
Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinoudakis, Sabrina De Capitani di Vimercati (Eds.) Auerbach Publications, Taylor and Francis Group, January 2008

Security and Privacy in Mobile and Wireless Networking
Stefanos Gritzalis, Tom Karygiannis, Charalabos Skianis (Eds.) Troubador Publishing Ltd, February 2009

Intrusion Detection and Prevention for Mobile Ecosystems
Georgios Kambourakis, Asaf Shabtai, Constantinos Kolias, Dimitrios Damopoulos (Eds.), CRC Press, September 2017.


Books (in Greek)
Συγχρονη Κρυπτογραφία - Θεωρία και Εφαρμογές
Mike Burmester - Stefanos Gritzalis - Sokratis Katsikas - Vasileios Chrisikopoulos

Προστασία της Ιδιώτικότητας & Τεχνολογίες Πληροφορικής και Επικοινωνιών
Costas Lambrinoudakis - Lilian Mitrou - Stefanos Gritzalis - Sokratis Katsikas

Ασφάλεια Ασυρμάτων και Κινητών Δικτύων Επικοινωνιών
Georgios Kambourakis - Stefanos Gritzalis - Sokratis Katsikas

Ασφάλεια Δικτύων Υπολογιστών
Stefanos Gritzalis - Sokratis Katsikas - Dimitris Gritzalis

Ασφάλεια Πληροφοριακών Συστημάτων
Sokratis Katsikas - Dimitrios Gritzalis - Stefanos Gritzalis

Projects



News
Chrome, Firefox Get Windows Defender Application Guard Extensions
Posted on Mar 18, 2019

Microsoft is extending the protection capabilities of Windows Defender Application Guard with the release of browser extensions for Chrome and Firefox.&;

EU Adopts New Response Protocol for Major Cyberattacks
Posted on Mar 18, 2019

Europol on Monday announced the adoption of a new protocol for how law enforcement authorities in the European Union and beyond will respond to major cross-border cyberattacks.

Australia's Intelligence Agency Publishes its Vulnerability Disclosure Process
Posted on Mar 18, 2019

The Australian Signals Directorate (ASD), Australia's intelligence agency responsible for foreign signals intelligence, has joined America's NSA and the UK's GCHQ in publishing an account of its vulnerabilities disclosure process. All three agencies are part of the Five Eyes western intelligence alliance -- the remaining being Canada and New Zealand.

London’s Tourist Hot Spots Suffer 100m+ Cyber-Attacks
Posted on Mar 18, 2019

Kew Gardens tops the list in new FOI research

Mt Gox Crypto Boss Escapes Jail
Posted on Mar 18, 2019

Karpeles given 2.5 year sentence, suspended for four years

Just One Third of UK’s Small Firms Have Security Strategy
Posted on Mar 18, 2019

New study aims to raise SMB awareness this week

Not All Context in Threat Intelligence is Created Equal
Posted on Mar 18, 2019

Context has always been a critical delineator in threat intelligence. It’s what distinguishes data from information, information from intelligence, and the meaningless from the meaningful. But while the importance of context is irrefutable, there seems to be less of a consensus on what specific types of context intelligence should include in order to be relevant and actionable for decision makers.

Beto O'Rourke 'Mortified' Over Articles Written as Teen Member of Cult of the Dead Cow Hacker Group
Posted on Mar 18, 2019

Democratic presidential candidate Beto O’Rourke expressed regret Friday over writings he contributed as a teenage member of the Cult of the Dead Cow hacker group.

Ukraine Ready to Take on Russian Election Hackers
Posted on Mar 18, 2019

At the headquarters of Ukraine's SBU security service more than a dozen local and Western security experts watch a simulated foreign cyber attack on several big screens ahead of this month's presidential vote.

Dragos Acquires NexDefense, Releases Free ICS Assessment Tools
Posted on Mar 18, 2019

Industrial cybersecurity firm Dragos on Monday announced the acquisition of NexDefense, a company that specializes in visibility technology for industrial control systems (ICS), and the launch of free ICS security assessment tools.

E-Commerce Company Gearbest Leaked User Information
Posted on Mar 15, 2019

Google this week revealed that it took down 2.3 billion bad ads last year, including 58.8 million phishing ads.

NATO Takes Huawei Security Concerns Seriously: Stoltenberg
Posted on Mar 15, 2019

Security concerns about the role of Huawei in Western 5G telecom infrastructure are to be taken seriously, the head of NATO said Thursday, as Washington steps up pressure on Europe not to use the Chinese firm.

Google Took Down 2.3 Billion Bad Ads in 2018
Posted on Mar 15, 2019

Brussels has targeted the Silicon Valley firm's AdSense advertising service, saying it restricts some client websites from displaying ads from third parties.

NAO Criticizes UK’s Failing National Cyber Program
Posted on Mar 15, 2019

Auditor warns lack of evidence is hampering delivery

Details of Actively Exploited Windows Flaw Made Public
Posted on Mar 15, 2019

Researchers from Chinese cybersecurity firm Qihoo 360 have made public technical details that can be used to construct a proof-of-concept (PoC) exploit for CVE-2019-0808, a recently patched Windows vulnerability that has been involved in targeted attacks.

China Does Not Ask Firms to Spy on Others: Premier
Posted on Mar 15, 2019

The ads were taken down for violations of both new and existing policies, and the Internet company said it faced challenges in areas where online advertising was used to scam or defraud users offline.

G Suite Admins Can Now Disable Phone 2-SV
Posted on Mar 15, 2019

A recently patched

Facebook Fixed, but Did Outage Hurt Trust?
Posted on Mar 15, 2019

Facebook stock fell by 3% on Thursday.

Recently Patched WinRAR Flaw Exploited in APT Attacks
Posted on Mar 15, 2019

Over the past several months, threat actors have been increasingly targeting Office 365 and G Suite cloud accounts that are using the legacy IMAP protocol, in an attempt to bypass multi-factor authentication (MFA), Proofpoint reports.

Uncovering the Data Security Triad
Posted on Mar 15, 2019

China will "never" ask its firms to spy on other nations, Premier Li Keqiang said Friday, amid US warnings that Chinese telecommunications behemoth Huawei poses security risks.


University of the Aegean | Greece

School of Engineering | Information and Communication Systems Engineering

Karlovassi, Samos, 83200, Greece

Email : info-sec-lab@aegean.gr | Fax : +30-22730-82009

ICSD 2008-2019