Contact
University of the Aegean
Department of Information and Communication Systems Engineering
Info Sec Lab
Laboratory of Information & Communication Systems Security

Welcome

Welcome to the home page of the "Info-Sec-Lab" Laboratory of Information & Communication Systems Security, Dept. of Information and Communication Systems Engineering, School of Engineering, University of the Aegean, Greece.








I & CT Security Conferences
TSEC-NextSecSociety 2017
Submission Deadline: Dec 31, 2017
Journal of Cyber Security Technology Special Issue on Secure Smart Society in Next Generation Networking Paradigm
N/A
N/A
 
ICC 5G-Security 2018
Submission Deadline: Jan 3, 2018
The First IEEE Workshop on 5G Wireless Security - ICC 2018
May 20, 2018 - May 24, 2018
Kansas City, MO, USA
 
DISSECT 2018
Submission Deadline: Jan 5, 2018
IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies
Apr 23, 2018 - Apr 23, 2018
Taipei, Taiwan
 
FSC 2018
Submission Deadline: Jan 6, 2018
The 1st IEEE International Symposium on the Future of Security Controls
Apr 23, 2018 - Apr 26, 2018
Barcelona, Spain
 
MCSMS 2018
Submission Deadline: Jan 6, 2018
The Fourth IEEE International Workshop on Mobile Cloud Computing systems, Management, and Security
Apr 23, 2018 - Apr 26, 2018
Barcelona, Spain
 
S4CIP 2018
Submission Deadline: Jan 10, 2018
3rd International Workshop on Safety & Security aSSurance for Critical Infrastructures Protection
Apr 27, 2018 - Apr 27, 2018
London, United Kingdom
 
SPIDA 2018
Submission Deadline: Jan 12, 2018
Workshop on Security Protocol Implementations: Development and Analysis
Apr 23, 2018 - Apr 23, 2018
London, United Kongdom
 
BiDAS 2018
Submission Deadline: Jan 14, 2018
The 2nd International Workshop on Big Data analytics, Security and Privacy
May 8, 2018 - May 8, 2018
Essaouira, Morocco
 
JIS-SI-CS 2018
Submission Deadline: Jan 15, 2018
EURASIP Journal on Information Security SI on Cybersecurity: Trends, Issues, and Challenges
N/A
N/A
 
ACM CPSS 2018
Submission Deadline: Jan 20, 2018
4th ACM Cyber-Physical System Security Workshop
Jun 4, 2018 - Jun 4, 2018
Incheon, Korea
 
TSEC-NextSecSociety 2017
Submission Deadline: Dec 31, 2017
Journal of Cyber Security Technology Special Issue on Secure Smart Society in Next Generation Networking Paradigm
N/A
N/A
 
ICC 5G-Security 2018
Submission Deadline: Jan 3, 2018
The First IEEE Workshop on 5G Wireless Security - ICC 2018
May 20, 2018 - May 24, 2018
Kansas City, MO, USA
 
DISSECT 2018
Submission Deadline: Jan 5, 2018
IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies
Apr 23, 2018 - Apr 23, 2018
Taipei, Taiwan
 
FSC 2018
Submission Deadline: Jan 6, 2018
The 1st IEEE International Symposium on the Future of Security Controls
Apr 23, 2018 - Apr 26, 2018
Barcelona, Spain
 
MCSMS 2018
Submission Deadline: Jan 6, 2018
The Fourth IEEE International Workshop on Mobile Cloud Computing systems, Management, and Security
Apr 23, 2018 - Apr 26, 2018
Barcelona, Spain
 
S4CIP 2018
Submission Deadline: Jan 10, 2018
3rd International Workshop on Safety & Security aSSurance for Critical Infrastructures Protection
Apr 27, 2018 - Apr 27, 2018
London, United Kingdom
 
SPIDA 2018
Submission Deadline: Jan 12, 2018
Workshop on Security Protocol Implementations: Development and Analysis
Apr 23, 2018 - Apr 23, 2018
London, United Kongdom
 
BiDAS 2018
Submission Deadline: Jan 14, 2018
The 2nd International Workshop on Big Data analytics, Security and Privacy
May 8, 2018 - May 8, 2018
Essaouira, Morocco
 
JIS-SI-CS 2018
Submission Deadline: Jan 15, 2018
EURASIP Journal on Information Security SI on Cybersecurity: Trends, Issues, and Challenges
N/A
N/A
 
ACM CPSS 2018
Submission Deadline: Jan 20, 2018
4th ACM Cyber-Physical System Security Workshop
Jun 4, 2018 - Jun 4, 2018
Incheon, Korea
 
ACNS 2018
Submission Deadline: Jan 26, 2018
Applied Cryptography and Network Security
Jul 2, 2018 - Jul 4, 2018
Leuven, Belgium
 
IH&MMSec 2018
Submission Deadline: Jan 27, 2018
ACM Workshop on Information Hiding and Multimedia Security
Jun 20, 2018 - Jun 22, 2018
Innsbruck, Austria
 
USENIX-Security 2018
Submission Deadline: Feb 8, 2018
27th USENIX Security Symposium
Aug 15, 2018 - Aug 17, 2018
Baltimore
 
TrustCom 2018
Submission Deadline: Feb 15, 2018
The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
Aug 1, 2018 - Aug 3, 2018
New York
 
WEIS 2018
Submission Deadline: Feb 18, 2018
Workshop on the Economics of Information Security
Jun 18, 2018 - Jun 19, 2018
Innsbruck, Austria
 
FI-IoTSP 2018
Submission Deadline: Feb 28, 2018
Future Internet Journal: Special Issue on IoT Security and Privacy
N/A
N/A
 

Members
Faculty Members
Postdoctoral Research Fellows
Postgraduate Research Fellows

Publications
Journals
Conferences
Books
Book Chapters
Conference Proceedings Editing

Research Areas

Our main research interests lie in the areas of:

  • Security and Privacy Economics
  • Secure eCommerce, eBusiness, eGovernment, eHealth
  • Privacy Technologies
  • Development of Secure Information Systems
  • Smart Cards Technologies
  • Security and Privacy Legal and Regulatory issues
  • Forensics Investigation; Internet Telephony Security
  • Wireless and Mobile Communications Security
  • Privacy and Trust in Wireless Sensor Networks
  • Security and Privacy in m-health environments
  • Formal Methods for the Analysis and Design of Cryptographic Protocols

Books (in English)
Digital Privacy: Theory, Technologies, and Practices
Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinoudakis, Sabrina De Capitani di Vimercati (Eds.) Auerbach Publications, Taylor and Francis Group, January 2008

Security and Privacy in Mobile and Wireless Networking
Stefanos Gritzalis, Tom Karygiannis, Charalabos Skianis (Eds.) Troubador Publishing Ltd, February 2009

Intrusion Detection and Prevention for Mobile Ecosystems
Georgios Kambourakis, Asaf Shabtai, Constantinos Kolias, Dimitrios Damopoulos (Eds.), CRC Press, September 2017.


Books (in Greek)
Συγχρονη Κρυπτογραφία - Θεωρία και Εφαρμογές
Mike Burmester - Stefanos Gritzalis - Sokratis Katsikas - Vasileios Chrisikopoulos

Προστασία της Ιδιώτικότητας & Τεχνολογίες Πληροφορικής και Επικοινωνιών
Costas Lambrinoudakis - Lilian Mitrou - Stefanos Gritzalis - Sokratis Katsikas

Ασφάλεια Ασυρμάτων και Κινητών Δικτύων Επικοινωνιών
Georgios Kambourakis - Stefanos Gritzalis - Sokratis Katsikas

Ασφάλεια Δικτύων Υπολογιστών
Stefanos Gritzalis - Sokratis Katsikas - Dimitris Gritzalis

Ασφάλεια Πληροφοριακών Συστημάτων
Sokratis Katsikas - Dimitrios Gritzalis - Stefanos Gritzalis

Projects



News
Chinese CA StartCom Set to Close Down
Posted on Nov 21, 2017

Controversial certificate authority and parent company WoSign not trusted by browser makers

Code Execution Flaw Found in HP Enterprise Printers
Posted on Nov 21, 2017

A newly observed variant of the macOS-targeting Proton malware is spreading through a blog spoofing that of legitimate security company Symantec.

Has Everyone Really Been Hacked?
Posted on Nov 21, 2017

The notorious Cobalt hackers have shown a change in tactics recently, switching their attacks to targeting banks themselves, instead of bank customers, Trend Micro reports.

House Committees Get Serious in New Letter to Equifax
Posted on Nov 21, 2017

Researchers have found a potentially serious remote code execution vulnerability in some of HP’s enterprise printers. The vendor claims to have already developed a patch that will be made available to customers sometime this week.

Cyber-criminals' Industry Targets Shift in Q3
Posted on Nov 21, 2017

The quarter saw a rise in attacks against accounting, biopharma, retail, biotech and pharmaceuticals.

BankBot Android Trojan Re-emerges Globally
Posted on Nov 21, 2017

A new version of the BankBot Android mobile banking malware has snuck into Google Play, targeting apps of large banks.

U.S. Charges Iranian Over 'Game of Thrones' HBO Hack
Posted on Nov 21, 2017

The final version of the 2017 OWASP Top 10 was released on Monday and some types of vulnerabilities that don’t longer represent a serious risk have been replaced with issues that are more likely to pose a significant threat.

Symantec Patches Vulnerability in Management Console
Posted on Nov 21, 2017

The chairpersons of the House Science, Space, and Technology Committee and the House Oversight and Government Reform Committee on Monday sent a new letter (

Intel Chip Flaws Expose Millions of Devices to Attacks
Posted on Nov 21, 2017

At least two cybersecurity firms have noticed that the notorious Lazarus threat group, which many experts have linked to North Korea, has been using a new piece of Android malware to target smartphone users in South Korea.

macOS Malware Spread Via Fake Symantec Blog
Posted on Nov 21, 2017

There is little doubt that fear sells security products, hikes law enforcements agency (LEA) budgets and sells newspapers. Both the security industry and government agencies benefit from sensational headlines; leaving people wondering what the real truth may be. So when UK newspaper

Final Version of 2017 OWASP Top 10 Released
Posted on Nov 21, 2017

Intel has conducted an in-depth security review of its Management Engine (ME), Trusted Execution Engine (TXE) and Server Platform Services (SPS) technologies and discovered several vulnerabilities. The company has released firmware updates, but it could take some time until they reach the millions of devices exposed to attacks due to these flaws.

DDoS Attacks Nearly Double Since January
Posted on Nov 20, 2017

In Q3, organizations experienced an average of 237 DDoS attack attempts per month, equivalent to eight attempts every day.

Nevada Tops the List of Worst States for Cyberbullying
Posted on Nov 20, 2017

California, Florida, Illinois and New York are also in the top 10.

Mayor Urged to Halt “Intrusive” Met Facial Recognition Trials
Posted on Nov 20, 2017

London police profiling public without appropriate legal framework

Dealing With Data Loss Your Firewall Can't Stop
Posted on Nov 20, 2017

US Army Exposes Terabytes of Surveillance Data
Posted on Nov 20, 2017

S3 buckets contain billions of citizens' internet records

Secureworks Releases Open Source IDS Tools
Posted on Nov 20, 2017

Information security is built on the pillars of confidentiality, integrity, and availability. Confidentiality is about making sure your secrets stay secret.

GitHub Rolls Out Security Alerts for Developers
Posted on Nov 20, 2017

Latest feature should result in more secure code

Flaw in F5 Products Allows Recovery of Encrypted Data
Posted on Nov 20, 2017

View All Sponsored News
Posted on Nov 17, 2017

A security researcher at UpGuard found exposed data in Amazon Web Services cloud storage buckets and once again the data belongs to the Department of Defense.


University of the Aegean | Greece

School of Engineering | Information and Communication Systems Engineering

Karlovassi, Samos, 83200, Greece

Email : info-sec-lab@aegean.gr | Fax : +30-22730-82009

ICSD 2008-2017