Curriculum Vitae. Personal information. Work experience. First name / Surname Thanassis Giannetsos



Similar documents
Antonis Michalas. Head of Cybersecurity Group. Education. PhD Thesis. Professional Experience

Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Department of Electronic Information Engineering, Beihang Univerisity Specialization: Electrical Engineering, Completion: July 2004

Resume. Dr. Vedat COSKUN. Organisational Personal Personal Web Site Research Lab Web Site

TRUST Background. National Science Foundation Office of Integrative Activities (OIA) Core Funding (FY )

Center of Academic Excellence Cyber Operations Program 2013 Application

EIT ICT Labs MASTER SCHOOL. Specialisations

Dr Christos Anagnostopoulos. 1. Education. 2. Present employment. 3. Previous Appointments. Page 1 of 6

Security for Ad Hoc Networks. Hang Zhao

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

SWASTIK K. BRAHMA PROFESSIONAL EXPERIENCE

European Network for Cyber Security

Alessia Garofalo. Critical Infrastructure Protection Cyber Security for Wireless Sensor Networks. Fai della Paganella, 10-12/02/2014

Computer Scientist. Conduct research in latest computer and network security technologies for high assurance system security solutions

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma CpE /24/2016

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

June Zhang (Zhong-Ju Zhang)

M.Sc. Program in Informatics and Telecommunications

Curriculum Vitae Summary Employment University of Washington at Bothell Sept 2013 Present BBN Technologies June 2011 May 2013

ES Research at the Electrical Engineering School

Internet of Things (IoT): A vision, architectural elements, and future directions

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

CURRICULUM VITAE. Taha Abdelshafy Abdelhakim Khalaf. Assistant Professor. Electrical Engineering Dept. Assiut University. Assiut, Egypt.

Intrusion Prevention and Detection in Wireless Sensor Networks

Trust and Reputation Management in Distributed Systems

ICT SECURITY SECURE ICT SYSTEMS OF THE FUTURE

LIVERPOOL HOPE UNIVERSITY COMPUTER SCIENCE FACULTY OF SCIENCE YOUR FUTURE STARTS WITH HOPE

Manal Hammadi jasim Al-Kubaisi

Cyber DTU. Lars Ramkilde Knudsen

EIT ICT Labs MASTER SCHOOL S&P Programme Specialisations

Ryerson University Phone: (416) ext: 4920

Proposal for a Graduate Certificate in Information Assurance Education Track 2. Submitted. by the. School of Technology West Lafayette Campus

CURRICULUM VITAE. September, 2015

Diploma (5-year degree), School of Applied Mathematics and Physics, NTUA (Greece) Major: Computer Science and Applied Mathematics.

Cyber-Physical System Security of the Power Grid

MH NOROUZI RÉSUMÉ AND CV

Europass Curriculum Vitae

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

A Systems Engineering Approach to Developing Cyber Security Professionals

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing

Vitor Manuel Parreira Pereira

CS 464/564 Networked Systems Security SYLLABUS

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

CONTENT. King Hussein Faculty of Computing Sciences

Summer projects for Dept. of IT students in the summer 2015

Bachelor of Information Technology (Network Security)

Joint Master in Information Security and Data Management (ISDM)

How To Become A Computer Scientist

Call for Papers for Ad-hoc and Sensor Networks Symposium

Seminar TK: Ubiquitous Computing

Victoria SINCLAIR Curriculum vitae

TUSKEGEE CYBER SECURITY PATH FORWARD

New System Security Model for a Mobile Operator s Meshed Access Network

MASTER OF SCIENCE (MSc) IN ENGINEERING (SOFTWARE ENGINEERING) (Civilingeniør, Cand. Polyt. i Software Engineering)

A LEADING GRADUATE SCHOOL AND RESEARCH CENTER IN COMMUNICATION SYSTEMS. MEDITERRANEAN DAYS CAMPUS SophiaTech

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis,

EECS 588: Computer and Network Security. Introduction

EECS 588: Computer and Network Security. Introduction January 14, 2014

Master of Science in Software Engineering Student Guide

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Web Technologies

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Information Technology Diploma in Web Technologies

Wireless Sensor Networks Chapter 14: Security in WSNs

Security Issues in Biomedical Wireless Sensor Networks

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

Enabling the secure use of RFID

11741 E-Business Credit Hours: Integrated Application Systems Credit Hours: Enterprise Systems Architecture Credit Hours: 3

NSC Cloud Computing and Information Security Program

Cyber Security. Vision. Mission

Anca Nitulescu. PhD Student. Personal information. Occupational field. PhD in cryptography

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt University of Zurich

LIVERPOOL HOPE UNIVERSITY FACULTY OF SCIENCE COMPUTER SCIENCE YOUR FUTURE STARTS WITH HOPE

EIT ICT Labs MASTER SCHOOL DSS Programme Specialisations

CURRICULUM VITAE. Dept. of Mechanical Engineering and Industrial Design Τ.Ε.Ι. of Western Macedonia KOZANI, GREECE

Research Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era

POSTGRADUATE OPEN DAY

Cyber Security at NSU

We have introduced the title of Associate Professor for our grade 9 academic staff, which is equivalent to Senior Lecturer.

CS Master at UNS. Two-year program: M1 + M2. Entry points in first or second year (M1 only, M2 only or M1 + M2)

Cyber security Building confidence in your digital future

Preventing Resource Exhaustion Attacks in Ad Hoc Networks

UNIVERSITY OF ZULULAND FACULTY OF SCIENCE AND AGRICULTURE DEPARTMENT OF COMPUTER SCIENCE POSTGRADUATES

ATTPS Publication: Trustworthy ICT Taxonomy

Privacy and Security in Healthcare

Swiss Joint Master in Computer Science of the universities of Bern, Neuchâtel and Fribourg

Including Real Networking Hardware in the Modeling and Simulation (M&S) Environment.

Student Handbook Master of Information Systems Management (MISM)

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper

ASSISTANT / ASSOCIATE PROFESSOR (TENURE TRACK)

Adversary Modelling 1

MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman

MEng, BSc Applied Computer Science

Networked Systems Security

Collection Policy: Computer Science

Transcription:

Curriculum Vitae Personal information First name / Surname Home Page https://www.kth.se/profile/athgia/ Address Papaflessa 34, Ano Flyfada, 166 74, Greece Telephone(s) + 30 210 9648517, + 30 6977400395 E-mail athgia@kth.se Nationality Greek Date of birth March 07, 1984 Marital Status Single Work experience Dates April 2013 Today Postdoctoral Researcher, Networked Systems Security Group, Member of ACCESS Linnaeus Centre Research in Security & Resilience in Wireless Networks/ Security & Privacy-Enhancing in IoT/ Security in Vehicular Communications/ Malware Analysis/ Lectures/ Involvement in European projects KTH Royal Institute of Technology Dates January 2012 March 2013 Researcher, Algorithms & Security group Research & Design of cryptographic algorithms and protocols/ Ubiquitous Computing & Participatory Sensing/Lectures/ Consulting/ Involvement in European projects Dates January 2008 December 2011 Research Associate, Algorithms & Security group Wireless network security (design of Intrusion Detection Systems for WSNs)/ Cryptographic Analysis/ Visiting Lectures (in parallel with PhD studies) Dates October 2006 2008 Research Assistant, Security/ Wireless Networks/ Distributed Systems Research in Security of Wireless & Sensor Networks/ Trust and Privacy research in decentralized environments (in parallel with MSc Studies) Page 1/5 - Curriculum vitae of

Education and training Title of qualification awarded PhD Thesis Title Supervisors Faculty members of the threemember committee External activities Title of qualification awarded Dates January 2008 to January 2012 PhD in Computer Science and Engineering Security, Sensor Networks, Cryptographic Algorithms & Protocols, Malware Analysis, Cloud Computing, Internet of Things etc. CTiF Department, University of Aalborg, Denmark Security Threats in Wireless Sensor Networks: Implementation of Attacks & Defense Mechanisms Professor Tassos Dimitriou (AIT) Professor Neeli R. Prasad (CTiF) Professor H. Vincent Poor, School of Engineering and Applied Science, Princeton University, USA Associate Professor Panagiotis Papadimitratos, KTH, Royal Institute of Technology, School of EE, Stockholm, Sweden Participation in the International summer school SENIOT From Sensor Networks to Networked Intelligent Objects (CONET 2009), Bertinoro, Italy Dates 2006 -- 2008 Master of Science in Information Networking Algorithms, Security, Embedded & Distributed Systems, Wireless Networks etc. Carnegie Mellon University, Pittsburgh, Pennsylvania Dates 2001 -- 2006 Title of qualification awarded BSc in Computer Science and Communication Engineering, Degree 8.16/10 Algorithms, Mathematics, Telecommunications, Distributed Programming Department of Computer & Communication Engineering, University of Thessaly, Greece Personal skills and Mother tongue Other language(s) Social/Organisational skills and Greek English (Excellent) French (Basic) KTH and AIT are multicultural environments where people from all over the world come to study and do research. Being a postdoctoral fellow and senior researcher in such environments implies that one should feel at home interacting and communicating with other people (excellent evaluations from other colleagues constitute further evidence for these skills ). Additionally, participating in the coordination, implementation and execution of International projects improves one s ability to adapt to dynamically changing environments and conditions as well as sharpening one s communication skills. Being part of the Security groups of both institutions requires a lot of administration and coordination for team research work, project execution and deliverables, etc. Apart from these typical requirements, of equal importance is the co-supervision of students and researchers to carry out contractual work with respect to European and National projects but most importantly to promote advancements in the field of Network and Information Security. Page 2/5 - Curriculum vitae of

Technical skills and Computer skills and Other Skills and Summary of Qualifications Algorithms, Programming, Mathematics, Cryptography, Computer and Network security. Knowledge of the field is evident from the large number of publications produced and an equally large number of people referencing this researcher s work. Additionally, participation in conferences (as reviewer) and European projects is also further proof of technical competence in the field. Strong Computer Science background. This implies knowledge of various types of operating systems, databases, programming languages (Java, C/C++, Matlab, PhP, Python, SQL), etc Knowledge of various programming languages is evident from a number of tools (e.g., SenSys, Spy-Sense) produced and presented in prestigious conferences and events, as well as, from the implementation of largescale security middleware and frameworks for various European projects. Participation in R&D and European projects (see below for further details), Organization of new R&D initiatives, Technical writing skills Dr Giannetsos Thanassis is interested in various aspects of Theoretical Computer Science like combinatorial optimization, design and analysis of heuristics/probabilistic algorithms for difficult to solve problems, sensor and RFID networks, vehicular communication networks, and computer and network security (especially why the latter is so difficult to achieve in real life ). At KTH he is member of the Networked Systems Security group at the LCN division of the EE Department. Members in the group conduct research in areas spanning from the theoretical foundations of cryptography to the design and implementation of leading edge efficient and secure communication protocols. His research in the above fields has resulted in numerous publications, some of which received distinction, and numerous invitations for talks in prestigious conferences. His research interests include Security and Resilience in Sensor Networks Sensor Networks Applications (e.g., participatory sensing which is a hot research direction throughout the world) Security and Privacy-Enhancing in Internet of Things technologies RFID technologies Smart Cards Security Experimental Security in Ad hoc networks Design of cryptographic algorithms and protocols Cryptographic Analysis (Cryptanalysis) & Malware Analysis Reveal new possible weaknesses that can be exploited by adversaries in order to achieve better and more realistic security architectures Security in Telecommunications networks Security, Privacy and Identity Management in Cloud Computing Applied Cryptography and Computer Security Professional activities, memberships, etc. Numerous publications in International conferences and journals Invited speaker to prestigious events on topics related to security including Black Hat events for presenting new attack/hacking techniques especially in the field of wireless networks (e.g. sensor networks) Reviewer of technical papers in the field of network and information security Designer of professional and executive courses aiming at creating security aware professionals. These courses are offered as part of the outreach program of (AIT) Technical Program Committee Membership Conference on Security & Privacy in Comm. Networks (SecureComm), Conf. on Security & Cryptography (SECRYPT), IEEE Conf. on New Technologies, Mobility & Security (NTMS), IEEE Conf. on Communications (ICC), IEEE Wireless Comm. & Networking Conference (WCNC), ACM Conf. on emerging Networking Experiments & Technologies (CONEXT), IEEE Conf. on Connected Vehicles (ICCVE), Global Wireless Summit (GWS), Intr. Workshop on Sensors and Systems for Pervasive Computing (PerSeNS) Funding, National/International projects Participation in the European project PRESERVE (Duration 4 years, ends December 2014). The goal of PRESERVE is to bring secure and privacy-protected V2X communications closer to reality by providing and field testing a security and privacy subsystem for V2X systems. Principal Investigator for the European project SafeCity (Duration 2 years, ends April 2013, Funding 320K Euros). SafeCity deals with smart Public safety and security in cities. The main objective is to enhance the role of Future Internet in ensuring people feel safe in their surroundings at time that their surroundings are protected. Page 3/5 - Curriculum vitae of

Funding, National/International Projects I coordinated the Algorithms & Security Group of AIT for the research and development of certain advanced Internet technologies including sensor, end-to-end security for safeguarding public safety communications, identification of generic enablers and platform design, prototyping and implementation. Contribution to SafeCity s specific requirements and Framework characterization through consulting and preparation of design documents (e.g., Specifications, Reports, etc.) Participation in the European Project Lotus (Duration 3 years, ended December 2011, Funding 284K Euros). The concept and objectives of the LOTUS project is to create a system by which illicit production of explosives and drugs can be detected during the production stage. I participated in the coordination of the Algorithms & Security Group of AIT in the following activities: Investigation and implementation of efficient algorithms and protocols for establishing secure communications between nodes and the information system data collection center or between the nodes themselves. Provision of system security against eavesdropping or feeding false information into the network Design and evaluation of cryptographic primitives suitable for nodes with constrained resources. Participation in various small-scale internal enterprise & research projects. Teaching (2009-2012) As a Researcher and Assistant Professor I have been regularly involved in the provision (by giving a number of lectures and organizing lab exercises/seminars) of the following graduate-level courses: Wireless Sensor Networks, Object oriented Programming, Packet Switching, Embedded Systems, Introduction to Algorithms, Cryptography and Network Security. Publications Professionals and Executive Seminars/Courses offered while at AIT Have designed and taught professional and executive courses related to Cryptography and Network Security (including ways that an attacker follows to penetrate a wireless network ) aimed at professionals and people who want to become familiar with the exciting field of network security. The goal of this activity is to educate users and firms because security is as strong as its weakest link and the tools used to enforce security are never the weakest link. KTH Royal Institute of technology (April 2013 - Today) As a Postdoctoral researcher I have been involved in the provision of the following Master/Ph.D. courses: Networked Systems Security (NSS), Building Networked Systems Security (BNSS) and Advanced Networked Systems Security (ANSS) Theses 1). Embedded Systems and Interruption Signals; the ARM Case. Bachelor thesis, Department of Computer & Communication Engineering, University of Thessaly, Greece, 2006. 2). Intrusion Detection in Wireless Sensor Networks. MSc thesis, Carnegie Mellon University, Pittsburgh, Pennsylvania, 2008. 3). Security Threats in Wireless Sensor Networks: Implementation of Attacks & Defense Mechanisms. PhD thesis, University of Aalborg, Denmark, 2011. Refereed Conferences 1) S. Gisdakis, M. Lagana, T. Giannetsos, P. Papadimitratos, SEROSA: SERvice Oriented Security Architecture for Vehicular Communications. IEEE Int. Vehicular Networking Conf. (VNC), 2013. 2) T. Giannetsos and T. Dimitriou, Spy-Sense: Spyware Tool for Executing Stealthy Exploits against Sensor Networks. International Workshop on Hot Topics on Wireless Network Security & Privacy (HotWisec), 2013 3) R. Gimenez, D. Fuentes, D. Oancea, D. Gimenez, T. Dimitriou, T. Giannetsos, S. Tsekeridou, M. Carabano, Moving Advanced Safety to the Cloud: Some Outcomes of SafeCity Project. 7th Future Security Research Conference, September 2012. 4) Michalas, T. Dimitriou, T. Gianetsos, N. Komninos and N. R. Prasad. Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes, MobiSec 2011. Distinguished paper 5) T. Giannetsos and T. Dimitriou. Spy-Sense: Spyware Tool for Executing Stealthy Exploits against Page 4/5 - Curriculum vitae of

Sensor Networks. Black Hat USA, Las Vegas, 2011. 6) T. Giannetsos and T. Dimitriou. Wormholes no more? Localized Wormhole Detection and Prevention in Wireless Networks. International Conference on Distributed Computing in Sensor Systems (DCOSS), Santa Barbara, California, 2010. 7) T. Giannetsos, T. Dimitriou and N. R. Prasad. Weaponizing Wireless Networks: An Attack Tool for Launching Attacks against Sensor Networks. Black Hat Europe, Barcelona, Spain, 2010. The tool received international media attention by Reuters and Forbes. 8) T. Giannetsos, T. Dimitriou and N. R. Prasad. Detecting Wormholes in WSNs. International Workshop on Wireless Network Security (WiSec), 2010. 9) T. Giannetsos, T. Dimitriou and N. R. Prasad. Self-Propagating Worms in Wireless Sensor networks. International Workshop on Emerging Networking Experiments & Technologies (Co-Next), 2009. 10) T. Giannetsos, T. Dimitriou and N. R. Prasad. State of the Art on Defenses against Wormhole Attacks in WSNs. International Conference on Wireless Vitae, Aalborg, Denmark, 2009. 11) Krontiris, Z. Benenson, T. Giannetsos, F. Freiling amd T. Dimitriou. Cooperative Intrusion Detection in WSN. European Conference on WSNs (EWSN), Cork, Ireland, 2009. 12) T. Giannetsos, I. Krontiris and T. Dimitriou. Launching a Sinkhole Attack in Wireless Sensor Networks; the Intruder Side. International Workshop on Security and Privacy in Wireless & Mobile Computing (SecPriWiMob), Avignon, France, 2008. 13) Krontiris, T. Giannetsos and T. Dimitriou. LIDeA: A Distributed Lightweight Intrusion Detection Architecture for Sensor Networks. International Conference on Security and Privacy in Communication Networks (SecureComm), Istanbul, Turkey, 2008. 14) I. Krontiris, T. Giannetsos, T. Dimitriou, and M. Mpasoukos, Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks. International Conf. on Algorithmic Aspects of WSNs, Poland, 2007. Book Chapters 1) T. Giannetsos, I. Krontiris, T. Dimitriou, Felix C. Freiling, " Intrusion Detection in Wireless Sensor Networks", Book Chapter in "Security in RFID and Sensor Networks," Paris Kitsos, Yan Zhang (eds), Auerbach Publications, CRC Press, Taylor&Francis Group, 2008. Journals 1) T. Giannetsos, T. Dimitriou, I. Krontiris and N. R. Prasad. Arbitrary Code Injection through Selfpropagating Worms in Von Neumann Architecture Devices. Computer Oxford Journal for the Algorithms, Protocols, and Future Applications of WSNs Special Issue, Volume 53, 2010. 2) T. Giannetsos, T. Dimitriou and N. R. Prasad. People-centric Sensing in Assistive Healthcare: Privacy Challenges and Directions. Security and Communication Networks Journal, 2011. 3) A. Michalas, T. Dimitriou, T. Giannetsos, N. Komninos and N. R. Prasad. Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes, Published in the Wireless Personal Communications journal, Volume 66, Number 3, July 2012 Distinguished paper 4) T. Giannetsos and T. Dimitriou, LDAC: A Localized and Decentralized Algorithm for Efficiently Countering Wormholes in Mobile Wireless Networks, To be submitted in the International Journal of Computational Intelligence Studies, 2013. Honours & Awards Best Paper Award for the paper entitled Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes. In MobiSec, Aalborg, Denmark, May 2011 SenSys and Spy-Sense attack tools were first published in the Blakc Hat international event, one of the biggest and most important security conference series in the world (2010 and 2011 respectively) Interviewed by Forbes and Reuters Online articles in H Security blog, Sensor Network Security magazine and Cyber Arms- Computer Security blog Award by the Technical Chamber of Greece (TEE) for his exceptional performance in his undergraduate studies in the Department of Computer & Communication Engineering, University of Thessaly, Greece Scolarship, in 2001, for being admitted with the highest grade in the Department of Computer & Communication Engineering, University of Thessaly, Greece Page 5/5 - Curriculum vitae of