Category Archives: Activities

An effective attack method based on information exposed by search engines

Happy Hacking

Presentation

The attack is based on a 3-step methodology that can be fully automated in order to deploy massive attacks against vulnerable systems. The methodology takes advantage of the “Google Hacking” technique and extends it with two more steps that of information manipulation and the deployment of an exploit. Specially crafted implementations of the proposed attack methodology can be used per se to prevent cyber crime operations through the identification of vulnerable systems and prevention of massive cyber attacks against vulnerable systems.

G.A.R.S, real time protection from child grooming

The GARS (Grooming Attack Recognition System) is an innovative application which aims on  creating a safe internet for children by protecting them from online hazards. Specifically, GARS is focused on protecting from child grooming. This term refers to actions deliberately undertaken with the aim of child abuse through internet communications. GARS uses sophisticated techniques of document classification, personality recognition as well as fuzzy logic controllers in order to calculate grooming risk in real time. Whenever the calculated risk overlaps a designated threshold a warning signal is sent directly to the parent who is responsible for further actions. This threshold is calibrated according to the age and the gender of the child. At its current version, GARS supports grooming protection only in english language.

G.A.R.S, real time protection from child grooming, creating a safe internet

 

Cassiopeia: Real-time mobile security monitoring system

Cassiopeia aims to improve the conditions of supervision and control of the system security administrators, and reduce critical incidents response time. To achieve this Cassiopeia provides a convenient mobile system architecture with flexible and easily extensible design. The proposed  architecture supports real-time system monitoring and threat identification. Additionally, a visual representation of the monitored system’s status and activity is used to provide an abstracted overview. The system status and activity information are provided to the end user through a mobile application. This end user application is presented below:

System information tab

Realtime system statistics tab

Realtime activity visualization tab

Application configuration tab

 

 

Artemis: application designed to protect minors


Artemis is an innovative application designed to protect minors from malicious sexual exploitation attempts. Artemis analyzes the content of incoming messages (sms) on mobile phones running the Android operating system and sends an alert message whenever inappropriate content is detected. So far, Artemis supports ONLY English.

Download here!

Please read carefully the license terms and conditions before installing and
using the application. Charges may apply depending on your carrier.
Feel free to send us feedback about bugs and potential improvements.

CrypTool greek translation

Members of student group Ιnfosec of University of Macedonia, in cooperation with the developers of CrypTool, are currently working on developing the greek version of Cryptool.

The project aims at providing a successful development of the greek version that will be available on the official website of Cryptool.

So far, our team has undertaken the greek localization of:

  • CrypTool Wiki [url]
  • CrypTool 1.4 [url]
  • CrypTool 2.0 [url]
  • JCrypTool 1.0 [url]
  • CrypTool Online [url]
  • CrypTool Mobile [url]

If yoυ want to participate in the project please contact us.

Cyber Defense Exercises

The team members took part in the following Cyber Defense exercises:

  • 2nd National Cyber Defense Exercise – Greece (Panoptis 2011), 31 Οctober – 4 Νοvember 2011
  • NATO Cyber Defence Exercise 2010 (NCDEX 2010) Cyber Coalition, 16 – 19 November 2010
  • 1st National Cyber Defense Exercise – Greece (Panoptis 2010), 18 – 20 May 2010

 

Research and development projects

The team members are participating in the following research and development projects:

  • Module C: INFRASTRUCTURE SERVICES, MANAGEMENT, INFORMATION AND OPERATION OF ELECTRONIC IDENTITY AT THE UNIVERSITY OF MACEDONIA “Priority” 04 – Digital convergence and entrepreneurship, “Macedonia – Thrace”, co-financed by the European Regional Development Fund.
  • Module B2: ACADEMIC CONTENT TO OPEN ACCESS AT THE UNIVERSITY OF MACEDONIA: SERVICES ORGANIZATION, PROMOTION, AND ADOPTION OF INTERCONNECTION “Priority” 04 – Digital convergence and entrepreneurship, “Macedonia – Thrace”, co-financed by the European Regional Development Fund.