Contact
University of the Aegean
Department of Information and Communication Systems Engineering
Info Sec Lab
Laboratory of Information & Communication Systems Security

Welcome

Welcome to the home page of the "Info-Sec-Lab" Laboratory of Information & Communication Systems Security, Dept. of Information and Communication Systems Engineering, School of Engineering, University of the Aegean, Greece.




I & CT Security Conferences
JISA-IoT-A&D 2018
Submission Deadline: Oct 30, 2018
Recent Advances in Internet-of-Things Attacks and Defences
N/A
N/A
 
FI-IoTSP 2018
Submission Deadline: Oct 31, 2018
Future Internet Journal: Special Issue on IoT Security and Privacy
N/A
N/A
 
SPT-IoT 2019
Submission Deadline: Nov 10, 2018
The Third International Workshop on Security, Privacy and Trust in the Internet of Things
Mar 11, 2019 - Mar 15, 2019
Kyoto, Japan
 
Secu_AgeBigData 2019
Submission Deadline: Nov 15, 2018
Combating Security Challenges in the Age of Big Data
N/A
N/A
 
C2SI 2019
Submission Deadline: Nov 30, 2018
3rd International Conference on Codes, Cryptology and Information Security
Apr 22, 2019 - Apr 24, 2019
Mohammed V University in Rabat
 
JISA-IoT-A&D 2018
Submission Deadline: Oct 30, 2018
Recent Advances in Internet-of-Things Attacks and Defences
N/A
N/A
 
FI-IoTSP 2018
Submission Deadline: Oct 31, 2018
Future Internet Journal: Special Issue on IoT Security and Privacy
N/A
N/A
 
SPT-IoT 2019
Submission Deadline: Nov 10, 2018
The Third International Workshop on Security, Privacy and Trust in the Internet of Things
Mar 11, 2019 - Mar 15, 2019
Kyoto, Japan
 
Secu_AgeBigData 2019
Submission Deadline: Nov 15, 2018
Combating Security Challenges in the Age of Big Data
N/A
N/A
 
C2SI 2019
Submission Deadline: Nov 30, 2018
3rd International Conference on Codes, Cryptology and Information Security
Apr 22, 2019 - Apr 24, 2019
Mohammed V University in Rabat
 
COSADE 2019
Submission Deadline: Dec 1, 2018
Constructive Side-Channel Analysis and Secure Design
Apr 2, 2019 - Apr 4, 2019
Darmstadt, Germany
 
IEEE S&P 2019
Submission Deadline: Dec 1, 2018
IEEE Symposium on Security and Privacy
May 20, 2019 - May 22, 2019
San Francisco, CA
 
IEEE 5G-Security 2019
Submission Deadline: Dec 8, 2018
The 2019 IEEE Workshop on 5G Wireless Security with IEEE ICC 2019
May 20, 2019 - May 24, 2019
Shanghai, China
 
IoTBDS 2019
Submission Deadline: Dec 10, 2018
3rd International Conference on Internet of Things, Big Data and Security
May 2, 2019 - May 4, 2019
Heraklion, Crete, Greece
 
5G-NET-SEC 2019
Submission Deadline: Jan 15, 2019
Future Generation Computer Systems (IF=4.639) Special Issue on Advancements in 5G Networks Security
N/A
N/A
 
ACNS 2019
Submission Deadline: Jan 22, 2019
International Conference on Applied Cryptography and Network Security
Jun 5, 2019 - Jun 7, 2019
Bogotá, Colombia
 
ACISP 2019
Submission Deadline: Feb 15, 2019
The 24th Australasian Conference on Information Security and Privacy
Jul 3, 2019 - Jul 5, 2019
Christchurch, New Zealnad
 
ETRIJ Cyber Security & AI 2019
Submission Deadline: Mar 28, 2019
ETRI Journal Special issue on Cyber Security and AI
N/A
N/A
 

Members
Faculty Members
Postdoctoral Research Fellows
Postgraduate Research Fellows

Publications
Journals
Conferences
Books
Book Chapters
Conference Proceedings Editing

Research Areas

Our main research interests lie in the areas of:

  • Security and Privacy Economics
  • Secure eCommerce, eBusiness, eGovernment, eHealth
  • Privacy Technologies
  • Development of Secure Information Systems
  • Smart Cards Technologies
  • Security and Privacy Legal and Regulatory issues
  • Forensics Investigation; Internet Telephony Security
  • Wireless and Mobile Communications Security
  • Privacy and Trust in Wireless Sensor Networks
  • Security and Privacy in m-health environments
  • Formal Methods for the Analysis and Design of Cryptographic Protocols

Books (in English)
Digital Privacy: Theory, Technologies, and Practices
Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinoudakis, Sabrina De Capitani di Vimercati (Eds.) Auerbach Publications, Taylor and Francis Group, January 2008

Security and Privacy in Mobile and Wireless Networking
Stefanos Gritzalis, Tom Karygiannis, Charalabos Skianis (Eds.) Troubador Publishing Ltd, February 2009

Intrusion Detection and Prevention for Mobile Ecosystems
Georgios Kambourakis, Asaf Shabtai, Constantinos Kolias, Dimitrios Damopoulos (Eds.), CRC Press, September 2017.


Books (in Greek)
Συγχρονη Κρυπτογραφία - Θεωρία και Εφαρμογές
Mike Burmester - Stefanos Gritzalis - Sokratis Katsikas - Vasileios Chrisikopoulos

Προστασία της Ιδιώτικότητας & Τεχνολογίες Πληροφορικής και Επικοινωνιών
Costas Lambrinoudakis - Lilian Mitrou - Stefanos Gritzalis - Sokratis Katsikas

Ασφάλεια Ασυρμάτων και Κινητών Δικτύων Επικοινωνιών
Georgios Kambourakis - Stefanos Gritzalis - Sokratis Katsikas

Ασφάλεια Δικτύων Υπολογιστών
Stefanos Gritzalis - Sokratis Katsikas - Dimitris Gritzalis

Ασφάλεια Πληροφοριακών Συστημάτων
Sokratis Katsikas - Dimitrios Gritzalis - Stefanos Gritzalis

Projects



News
Symantec Completes Internal Accounting Investigation
Posted on Sep 25, 2018

Symantec announced on Monday that it has completed its internal accounting audit, and while some issues have been uncovered, only one customer transaction has an impact on financial statements.

MoD and GCHQ Set to Launch Offensive Cyber Force
Posted on Sep 24, 2018

Reports suggest £250m initiative could feature 2000 personnel

Cisco Removes Default Password From Video Surveillance Manager
Posted on Sep 24, 2018

James and Candace Butcher were ready to finalize the purchase of their dream retirement home, and at closing time wired $272,000 from their bank following instructions they received by email.

Solution to Skills Gap Is Strong Cyber Culture
Posted on Sep 24, 2018

(ISC)2 surveyed companies that report having all the cybersecurity staff they need.

Crytocurrency Mining Soars 459% from 2017 to 2018
Posted on Sep 24, 2018

Cryptocurrency mining is more than just a drain in resoucres, said Cyber Threat Alliance.

Operator of Counter AV Service Sentenced to 14 Years in Prison
Posted on Sep 24, 2018

A critical vulnerability recently patched in the Cisco Video Surveillance Manager (VSM) could allow an unauthenticated attacker to log in as

Scan4You CAV Operator Gets 14 Years
Posted on Sep 24, 2018

Site helped cyber-criminals secretly test their malware against AV tools

Japanese Crypto Exchange Hit by $60m Heist
Posted on Sep 24, 2018

Hackers steal coins from hot wallet

Scottish Brewery Recovered from Ransomware Attack
Posted on Sep 24, 2018

Arran Brewery raises a glass to successful recovery from targeted cyber-attack.

How to Make the Business Case for an Intelligence Program
Posted on Sep 24, 2018

Within hours, the money had vanished.

Industry Reactions to New National Cyber Strategy
Posted on Sep 24, 2018

Credential stuffing is a growing threat. It is not new, but for many companies it is treated as annoying background noise that can be absorbed by bandwidth, handled by access controls, and ignored. New figures suggest that this is a bad approach.

Credential Stuffing Attacks Are Reaching DDoS Proportions
Posted on Sep 24, 2018

A newly discovered piece of malware combines ransomware and botnet capabilities in a single package, Trend Micro security researchers reveal.

Bug Exposed Direct Messages of Millions of Twitter Users
Posted on Sep 24, 2018

Trend Micro's Zero Day Initiative (ZDI) on Thursday made public details on a vulnerability impacting the Microsoft JET Database Engine, although a patch isn’t yet available for it.

U.S. General Service Administration Launches Bug Bounty Program
Posted on Sep 24, 2018

The United States General Service Administration’s (GSA) Technology Transformation Service (TTS) has launched a bug bounty program on HackerOne, the hacker-powered security platform announced on Friday.

Hackers Target Real Estate Deals, With Devastating Impact
Posted on Sep 23, 2018

Cloudflare on Thursday announced a new service to provide Tor users with improved security and performance, while also aiming at reducing malicious network traffic.

Cloudflare Launches Security Service for Tor Users
Posted on Sep 21, 2018

Whenever someone wants to invoke a hacker for any purpose, we usually get some (stock photography) image of a lone, hooded malware author bent over a dark keyboard. Movies, too, perpetuate the idea of some socially maladjusted loner wreaking havoc single-handedly from his (or her) laptop, with the plot usually culminating in the arrest of the individual—and there the mayhem ends, because the single genius is now in solitary.

Accounting Firm Moss Adams Acquires Cybersecurity Firm AsTech
Posted on Sep 21, 2018

Facebook on Wednesday said it will have a "war room" up and running on its Silicon Valley campus to quickly repel efforts to use the social network to meddle in upcoming elections.

DMARC Fully Implemented on Two Thirds of U.S. Government Domains
Posted on Sep 21, 2018

Rockwell Automation Patches Severe Flaws in Communications Software
Posted on Sep 21, 2018

Independence Blue Cross Breach Exposed 17K Records
Posted on Sep 21, 2018

An employee error left PHI of members exposed on public-facing website.


University of the Aegean | Greece

School of Engineering | Information and Communication Systems Engineering

Karlovassi, Samos, 83200, Greece

Email : info-sec-lab@aegean.gr | Fax : +30-22730-82009

ICSD 2008-2018