Contact
University of the Aegean
Department of Information and Communication Systems Engineering
Info Sec Lab
Laboratory of Information & Communication Systems Security

Welcome

Welcome to the home page of the "Info-Sec-Lab" Laboratory of Information & Communication Systems Security, Dept. of Information and Communication Systems Engineering, School of Engineering, University of the Aegean, Greece.





I & CT Security Conferences
AI Safety and Security 2017
Submission Deadline: Jul 25, 2017
Artificial Intelligence Safety and Security. Edited Book. Call for Book Chapters.
May 2, 2017 - Aug 30, 2017
N/A
 
ICISSP 2018
Submission Deadline: Jul 31, 2017
4th International Conference on Information Systems Security and Privacy
Jan 22, 2018 - Jan 24, 2018
Funchal, Madeira, Portugal
 
4th NSysS 2017
Submission Deadline: Aug 1, 2017
2017 4th International Conference on Networking, Systems and Security (NSysS)
Dec 18, 2017 - Dec 20, 2017
Dhaka, Bangladesh
 
MIST 2017
Submission Deadline: Aug 4, 2017
The 9th ACM CCS International Workshop on Managing Insider Security Threats
Oct 30, 2017 - Nov 3, 2017
Dallas, USA
 
CPS-SPC 2017
Submission Deadline: Aug 4, 2017
ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC)
Nov 3, 2017 - Nov 3, 2017
Dallas, TX
 
WPES 2017
Submission Deadline: Aug 4, 2017
2017 Workshop on Privacy in the Electronic Society
Oct 30, 2017 - Oct 30, 2017
Dallas, Texas, United States
 
ICNS - Ei 2017
Submission Deadline: Aug 5, 2017
2017 The 2nd International Conference on Network Security (ICNS 2017)--ACM, Ei Compendex and Scopus
Dec 8, 2017 - Dec 10, 2017
Kunming, China
 
WICS 2017
Submission Deadline: Aug 6, 2017
4th International Workshop on Information and Communication Security
Nov 19, 2017 - Nov 22, 2017
Aomori, Japan
 
DMCS 2017
Submission Deadline: Aug 7, 2017
DMCS - Data Mining for Cyber Security 2017 (collocated with IEEE ICDM'17)
Nov 18, 2017 - Nov 18, 2017
New Orleans
 
iot s&p 2017
Submission Deadline: Aug 11, 2017
Internet of Things Security and Privacy
Nov 3, 2017 - Nov 3, 2017
Dallas, TX
 
TSP 2017
Submission Deadline: Aug 15, 2017
The 7th International Symposium on Trust, Security and Privacy for Emerging Applications
Dec 12, 2017 - Dec 15, 2017
Guangzhou, China
 
AI Safety and Security 2017
Submission Deadline: Jul 25, 2017
Artificial Intelligence Safety and Security. Edited Book. Call for Book Chapters.
May 2, 2017 - Aug 30, 2017
N/A
 
ICISSP 2018
Submission Deadline: Jul 31, 2017
4th International Conference on Information Systems Security and Privacy
Jan 22, 2018 - Jan 24, 2018
Funchal, Madeira, Portugal
 
4th NSysS 2017
Submission Deadline: Aug 1, 2017
2017 4th International Conference on Networking, Systems and Security (NSysS)
Dec 18, 2017 - Dec 20, 2017
Dhaka, Bangladesh
 
MIST 2017
Submission Deadline: Aug 4, 2017
The 9th ACM CCS International Workshop on Managing Insider Security Threats
Oct 30, 2017 - Nov 3, 2017
Dallas, USA
 
CPS-SPC 2017
Submission Deadline: Aug 4, 2017
ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC)
Nov 3, 2017 - Nov 3, 2017
Dallas, TX
 
WPES 2017
Submission Deadline: Aug 4, 2017
2017 Workshop on Privacy in the Electronic Society
Oct 30, 2017 - Oct 30, 2017
Dallas, Texas, United States
 
ICNS - Ei 2017
Submission Deadline: Aug 5, 2017
2017 The 2nd International Conference on Network Security (ICNS 2017)--ACM, Ei Compendex and Scopus
Dec 8, 2017 - Dec 10, 2017
Kunming, China
 
WICS 2017
Submission Deadline: Aug 6, 2017
4th International Workshop on Information and Communication Security
Nov 19, 2017 - Nov 22, 2017
Aomori, Japan
 
DMCS 2017
Submission Deadline: Aug 7, 2017
DMCS - Data Mining for Cyber Security 2017 (collocated with IEEE ICDM'17)
Nov 18, 2017 - Nov 18, 2017
New Orleans
 
iot s&p 2017
Submission Deadline: Aug 11, 2017
Internet of Things Security and Privacy
Nov 3, 2017 - Nov 3, 2017
Dallas, TX
 
TSP 2017
Submission Deadline: Aug 15, 2017
The 7th International Symposium on Trust, Security and Privacy for Emerging Applications
Dec 12, 2017 - Dec 15, 2017
Guangzhou, China
 
SPIoT 2017
Submission Deadline: Aug 15, 2017
The 6th International Symposium on Security and Privacy on Internet of Things
Dec 12, 2017 - Dec 15, 2017
Guangzhou, China
 
MISC.conf 2017
Submission Deadline: Aug 15, 2017
MISC.conf Security Conference
Oct 21, 2017 - Oct 21, 2017
Minneapolis
 
NISK 2017
Submission Deadline: Aug 25, 2017
NISK 2017: The Norwegian Information Security Conference 2017
Nov 27, 2017 - Nov 29, 2017
Oslo, Norway
 
Smart-City-IoT-Security 2017
Submission Deadline: Sep 1, 2017
Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
N/A
N/A
 
SI: MTAP UVS 2017
Submission Deadline: Sep 30, 2017
MTAP Springer Special issue on ‘Ubiquitous Visual Surveillance for Public Security’
Sep 30, 2017 - Sep 30, 2017
NA
 
HF 2017
Submission Deadline: Oct 1, 2017
Hackfest.ca 2017 | Canada largest hacking conference
Nov 3, 2017 - Nov 5, 2017
Quebec City, Qc, Canada
 
ASPMI 2018
Submission Deadline: Oct 15, 2017
Advances in Security and Privacy of Multimodal Interfaces
N/A
N/A
 
IoTBDS 2018
Submission Deadline: Oct 16, 2017
3rd International Conference on Internet of Things, Big Data and Security
Mar 19, 2018 - Mar 21, 2018
Funchal, Madeira, Portugal
 
SCN-CyberIoT 2017
Submission Deadline: Oct 27, 2017
Special Issue on Cybersecurity in the Internet of Things - Security and Communication Networks Journal
N/A
N/A
 
SCN-SPMAP 2017
Submission Deadline: Oct 27, 2017
Security and Communication Networks Journal - SI on Security and Privacy in Mobile Applications and Platforms
N/A
N/A
 
SPTE_SC 2017
Submission Deadline: Nov 10, 2017
IJDSN Special Collection on Secure Positioning Technologies for the Emerging Services and Computing Paradigms
N/A
N/A
 
TSEC-NextSecSociety 2017
Submission Deadline: Dec 31, 2017
Journal of Cyber Security Technology Special Issue on Secure Smart Society in Next Generation Networking Paradigm
N/A
N/A
 
FI-IoTSP 2018
Submission Deadline: Feb 28, 2018
Future Internet Journal: Special Issue on IoT Security and Privacy
N/A
N/A
 
SPIoT 2017
Submission Deadline: Aug 15, 2017
The 6th International Symposium on Security and Privacy on Internet of Things
Dec 12, 2017 - Dec 15, 2017
Guangzhou, China
 
MISC.conf 2017
Submission Deadline: Aug 15, 2017
MISC.conf Security Conference
Oct 21, 2017 - Oct 21, 2017
Minneapolis
 
NISK 2017
Submission Deadline: Aug 25, 2017
NISK 2017: The Norwegian Information Security Conference 2017
Nov 27, 2017 - Nov 29, 2017
Oslo, Norway
 
Smart-City-IoT-Security 2017
Submission Deadline: Sep 1, 2017
Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
N/A
N/A
 
SI: MTAP UVS 2017
Submission Deadline: Sep 30, 2017
MTAP Springer Special issue on ‘Ubiquitous Visual Surveillance for Public Security’
Sep 30, 2017 - Sep 30, 2017
NA
 
HF 2017
Submission Deadline: Oct 1, 2017
Hackfest.ca 2017 | Canada largest hacking conference
Nov 3, 2017 - Nov 5, 2017
Quebec City, Qc, Canada
 
ASPMI 2018
Submission Deadline: Oct 15, 2017
Advances in Security and Privacy of Multimodal Interfaces
N/A
N/A
 
IoTBDS 2018
Submission Deadline: Oct 16, 2017
3rd International Conference on Internet of Things, Big Data and Security
Mar 19, 2018 - Mar 21, 2018
Funchal, Madeira, Portugal
 
SCN-CyberIoT 2017
Submission Deadline: Oct 27, 2017
Special Issue on Cybersecurity in the Internet of Things - Security and Communication Networks Journal
N/A
N/A
 
SCN-SPMAP 2017
Submission Deadline: Oct 27, 2017
Security and Communication Networks Journal - SI on Security and Privacy in Mobile Applications and Platforms
N/A
N/A
 
SPTE_SC 2017
Submission Deadline: Nov 10, 2017
IJDSN Special Collection on Secure Positioning Technologies for the Emerging Services and Computing Paradigms
N/A
N/A
 
TSEC-NextSecSociety 2017
Submission Deadline: Dec 31, 2017
Journal of Cyber Security Technology Special Issue on Secure Smart Society in Next Generation Networking Paradigm
N/A
N/A
 
FI-IoTSP 2018
Submission Deadline: Feb 28, 2018
Future Internet Journal: Special Issue on IoT Security and Privacy
N/A
N/A
 

Members
Faculty Members
Postdoctoral Research Fellows
Postgraduate Research Fellows

Publications
Journals
Conferences
Books
Book Chapters
Conference Proceedings Editing

Research Areas

Our main research interests lie in the areas of:

  • Security and Privacy Economics
  • Secure eCommerce, eBusiness, eGovernment, eHealth
  • Privacy Technologies
  • Development of Secure Information Systems
  • Smart Cards Technologies
  • Security and Privacy Legal and Regulatory issues
  • Forensics Investigation; Internet Telephony Security
  • Wireless and Mobile Communications Security
  • Privacy and Trust in Wireless Sensor Networks
  • Security and Privacy in m-health environments
  • Formal Methods for the Analysis and Design of Cryptographic Protocols

Books (in English)
Digital Privacy: Theory, Technologies, and Practices
Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinoudakis, Sabrina De Capitani di Vimercati (Eds.) Auerbach Publications, Taylor and Francis Group, January 2008

Security and Privacy in Mobile and Wireless Networking
Stefanos Gritzalis, Tom Karygiannis, Charalabos Skianis (Eds.) Troubador Publishing Ltd, February 2009


Books (in Greek)
Συγχρονη Κρυπτογραφία - Θεωρία και Εφαρμογές
Mike Burmester - Stefanos Gritzalis - Sokratis Katsikas - Vasileios Chrisikopoulos

Προστασία της Ιδιώτικότητας & Τεχνολογίες Πληροφορικής και Επικοινωνιών
Costas Lambrinoudakis - Lilian Mitrou - Stefanos Gritzalis - Sokratis Katsikas

Ασφάλεια Ασυρμάτων και Κινητών Δικτύων Επικοινωνιών
Georgios Kambourakis - Stefanos Gritzalis - Sokratis Katsikas

Ασφάλεια Δικτύων Υπολογιστών
Stefanos Gritzalis - Sokratis Katsikas - Dimitris Gritzalis

Ασφάλεια Πληροφοριακών Συστημάτων
Sokratis Katsikas - Dimitrios Gritzalis - Stefanos Gritzalis

Projects



News
Multiple Zero-days Disclosed in Western Digital NAS Storage Devices
Posted on Mar 06, 2017

The Western Digital My Cloud range of storage devices, ranging from consumer products with up to 16TB storage (My Cloud Mirror) to business devices with up to 32TB storage (My Cloud Pro and My Cloud Expert) contain multiple firmware vulnerabilities that can be exploited remotely.

One Million Stolen Gmail & Yahoo Accounts for Sale on Dark Web
Posted on Mar 06, 2017

The accounts include names, emails and plain text passwords harvested from a variety of infamous data breaches

Twitter Flaw Allowed Access to Locked Accounts
Posted on Mar 06, 2017

Rockstar Games this week launched a public bug bounty program through HackerOne, after running it in private mode for more than nine months.

#GartnerIAM: Tackle GDPR Compliance with Risk Management
Posted on Mar 06, 2017

Gartner claims that despite low take up, GDPR compliance is not a lost cause

RDP Tops Email for Ransomware Distribution: Report
Posted on Mar 06, 2017

A company run by a couple of known spammers has unknowingly leaked a series of files containing sensitive information about its operations, including nearly 1.4 billion user records.

Shellshock Attacks Still Cheap and Easy: IBM
Posted on Mar 06, 2017

Researchers at Kaspersky Lab have come across a new and sophisticated piece of malware that can be used for both cyber espionage and wiping an infected computer’s storage.

HackerOne Offers Free Bounty Programs for Open Source
Posted on Mar 06, 2017

In the wake of high-profile open-source flaws like Heartbleed and Poodle, there’s an awareness that most of the tools and technology that we use every day run on open-source platforms.

Temporary Fix Available for Windows GDI Vulnerability
Posted on Mar 06, 2017

Two and a half years after being discovered, the Shellshock vulnerability continues to be abused in attacks, and for a good reason: it is a very cheap and easy attack, IBM says.

#GartnerIAM: Analytics in IAM Enable Security
Posted on Mar 06, 2017

A lot of negativity in security can be compounded with positivity of the future of IAM and analytics

Consumer Reports Debuts Impartial Privacy Standard
Posted on Mar 06, 2017

It can be used by businesses to measure the privacy and security of products, apps and services.

From Automation to Intelligence - Humans Needed
Posted on Mar 06, 2017

In February 2017, endpoint protection firm CrowdStrike took the unusual step of suing independent product testing organization NSS Labs, "to hold it accountable for unlawfully accessing our software, breaching our contract, pirating our software, and improper security testing."

Nurse Fined After Admitting to Accessing Patient Records
Posted on Mar 06, 2017

Nurse Elaine Lewis was dismissed from role after admitting breaching the Data Protection Act

CrowdStrike Vs NSS Labs, Round 2: NSS Hits Back
Posted on Mar 06, 2017

The security industry wrapped up what has arguably become the most significant trade show in the security industry: RSA Conference. While it’s always interesting to see what challenges hold the industry’s attention and how vendors plan to address them, I find the most useful information comes from informal conversations with customers and industry colleagues as opposed to official booth presentations.

Spammers Leak 1.4 Billion User Records
Posted on Mar 06, 2017

Twitter was until a few months ago affected by a vulnerability that could have been exploited to bypass the social media network’s account locking mechanism.

Shamoon-Linked "StoneDrill" Malware Allows Spying, Destruction
Posted on Mar 06, 2017

When Data Isn’t Keenly Analyzed to Raise it to the Level of Finished Intelligence, it Can Only Answer the Questions an Organization Knows to Ask

Slack hack threatened to expose user account data and messages
Posted on Mar 03, 2017

A new cybersecurity report used a hacker survey to offer a perspective on IT that can often be overlooked and found there may not be any easy answers.

Project Zero discovers Cloudflare bug leaking sensitive customer data
Posted on Mar 03, 2017

A new cybersecurity report used a hacker survey to offer a perspective on IT that can often be overlooked and found there may not be any easy answers.

Edge and IE vulnerability disclosed by Project Zero
Posted on Mar 03, 2017

A new cybersecurity report used a hacker survey to offer a perspective on IT that can often be overlooked and found there may not be any easy answers.

Using Cyber Threat Intelligence to Understand the Cyber Extortion Epidemic
Posted on Mar 03, 2017

Chinese VoIP Kit Contains Backdoor, Warn Researchers
Posted on Mar 03, 2017

Shenzhen-based DBL Technology patched but did not fix issue


University of the Aegean | Greece

School of Engineering | Information and Communication Systems Engineering

Karlovassi, Samos, 83200, Greece

Email : info-sec-lab@aegean.gr | Fax : +30-22730-82009

ICSD 2008-2015