Associate Researcher @ University of Piraeus
Aristeidis Farao is a Ph.D. candidate at the Department of Digital Systems of the School of Information and Communication Technologies of the University of Piraeus since 2018 and a Ph.D. Fellow at the European Security and Defence College (ESDC).
He received his B.Sc. degree in "Digital Systems Science'' in 2016 and his M.Sc. degree in "Digital Systems Security'' in 2018, both from the Department of Digital Systems of the University of Piraeus. Since 2016 he has been a member of the Security Systems Laboratory (SSL) of the University of Piraeus.
He has participated and contributed to research projects funded by the European Union (SealedGRID, SECONDO, INCOGNITO, SPIDER, LOCARD) and the Greek government (NETPHISH). In addition, he has experience as a Cybersecurity Analyst working in the private sector, where he participated in the design and development of advanced critical infrastructures with high security measures.
He has authored and co-authored scientific articles published in peer-reviewed journals and conferences and co-authored book chapters. He has more than 95 citations in his published work. In addition, he is a reviewer in peer reviewed journals such as: IEEE Transactions on Network, Service Management, Computer & Security - Elsevier and IET Information Security and in international conferences such as: SecAssure, ARES, ESORICS and Cyber-Physical Security.
He has also served as a member of technical committees in international conferences such as: IWAPS, CTSS and IWSECC. He has been a member of the IEEE community since 2022 and a certified Chief Inspector of Information Security Management Systems according to ISO 27001:2013 by TÜV Hellas (TÜV AUSTRIA) since 2017.
His research interests lie in the areas of security economics, cyber insurance, digital systems security, network security, application security, security in Smart Grid Networks, authentication and applied cryptography.
Friday 10.Nov / 10:50
Compete against each other in solving four security related challenges in about one hour. To solve a challenge, you may have to analyse digital files, reverse engineer binaries, crack hashes, break cryptographic algorithms or exploit programs’ vulnerabilities.
You will Learn more about Capture The Flag (CTF) competitions and their alternative gamified approach for delivering cybersecurity training and Introduce yourself into ethical hacking.