Professor @ University Pireaus
Prof. Christos Xenakis received his B.Sc degree in computer science in 1993, his M.Sc degree in telecommunication and computer networks in 1996 and in 2004 he received his Ph.D. from the University of Athens (Department of Informatics and Telecommunications).
From 1998 - 2001 he was with a Greek telecoms system development firm, where he was involved in the design and development of advanced telecommunications subsystems.
From 1996 - 2007 he was a member of the Communication Networks Laboratory of the University of Athens. Since 2007 he is a faculty member of the Department of Digital Systems of the University of Piraeus, Greece, where currently is a Professor, a member of the Systems Security Laboratory and the director of the Postgraduate Degree Programme, on "Digital Systems Security".
He has participated in numerous projects realized in the context of EU Programs as well as National Programs (Greek), where he has been serving as the project manager and/or the technical manager
He is also a steering committee member of the European Cyber Security Challenge (ECSC) and the leader of the Hellenic Cyber Security Team.
He is a member of the editorial board of four Thomson Reuters indexed journals (Computers & Security Journal, Computer Communications Journal, IET Information Security and The Computer Journal of the Oxford University Press).
His research interests are in the field of systems, networks and applications security. He has authored more than 100 papers in peer-reviewed journals and international conferences.
Security for smart industrial systems is prominent due to the proliferation of cyber threats threatening national critical infrastructures. Smart grid comes with intelligent applications that can utilize the bidirectional communication network among its entities. Microgrids are small-scale smart grids that enable Machine-to-Machine (M2M) communications as they can operate with some degree of independence from the main grid.
In addition to protecting critical microgrid applications,an underlying key management scheme is needed to enable secure M2M message transmission and authentication. Existing key management schemes are not adequate due to microgrid special features and requirements.
We propose the Micro sElf-orgaNiSed mAnagement (MENSA), which is the first hybrid key management and authentication scheme that combines Public Key Infrastructure (PKI) and Web-of-Trust concepts in micro-grids.
Our experimental results demonstrate the efficiency of MENSA in terms of scalability and swiftness.
#security #microgrid #mensaIn this short Capture the Flag (CTF) competition you will be asked to compete against each other in solving four security related challenges in about one hour. To solve a challenge, you may have to analyse digital files, reverse engineer binaries, crack hashes, break cryptographic algorithms or exploit programs’ vulnerabilities.
Three of the challenges will be offline and one will be online. For the offline challenges, you will have to download the challenges’ files and analyse them locally on your computer to recover the embedded flags. For the online challenge, you will be given access to a vulnerable service which you will have to hack and recover the hidden flag. During the competition the CTF organisers may change the pool of available challenges if any problem occurs (e.g. network problems) in order to keep the competition running.
Get ready, setup your Linux VMs, install your network analysers, fire up your reverse engineering tools and don’t forget to bring your exploitation cheat sheets. But remember… do not share flags, do not attack machines that are not part of the competition, do not attack the competition infrastructure, you may brute force only offline challenges, and of course have fun!
In this short Capture the Flag (CTF) competition you will be asked to compete against each other in solving four security related challenges in about one hour. To solve a challenge, you may have to analyse digital files, reverse engineer binaries, crack hashes, break cryptographic algorithms or exploit programs’ vulnerabilities.
Three of the challenges will be offline and one will be online. For the offline challenges, you will have to download the challenges’ files and analyse them locally on your computer to recover the embedded flags. For the online challenge, you will be given access to a vulnerable service which you will have to hack and recover the hidden flag. During the competition the CTF organisers may change the pool of available challenges if any problem occurs (e.g. network problems) in order to keep the competition running.
Get ready, setup your Linux VMs, install your network analysers, fire up your reverse engineering tools and don’t forget to bring your exploitation cheat sheets. But remember… do not share flags, do not attack machines that are not part of the competition, do not attack the competition infrastructure, you may brute force only offline challenges, and of course have fun!
#security #microgrid #mensa