Dr Tassos Dimitriou is affiliated with the Department of Computer Engineering at Kuwait University (KU) and the Research and Academic Computer Technology Institute (CTI) – Greece, where he is an adjunct Senior Researcher in the Research Unit 1. Dr Dimitriou is interested in various aspects of Theoretical Computer Science like combinatorial optimization, design and analysis of heuristics/probabilistic algorithms for difficult to solve problems, sensor and RFID networks, computer and network security (especially why the latter is so difficult to achieve in real life…).
Prior to that, Dr Dimitriou was an Associate professor at Athens Information Technology – Greece and adjunct faculty of Information Networking Institute at Carnegie Mellon University, USA. At AIT he was leading the Algorithms and Security group where the primary objective was to bring together expertise in education, research and practice in the field of information security and algorithms, conducting research in areas spanning from the theoretical foundations of cryptography to the design and implementation of leading edge efficient and secure communication protocols. A brochure and a snapshot of this research which is still ongoing can be seen here. Dr Dimitriou was also the organizer of PRACSE, a semi-annual event event focusing on issues related to important properties of systems and business security, however, with an emphasis on practical aspects of security. Further evidence to the importance of PRACSE is given by its list of eminent academics, professionals and keynote speakers that regularly participated in the event!
Dr Dimitriou's research in the above fields has resulted in numerous publications, some of which received distinction, and numerous invitations for talks in prestigious conferences like the International World Wide Web conference and InfoCom. Furthermore, apart from his usual academic admin/teaching/research duties, he regularly consults with companies on topics related to security and he gives short and professional courses aimed at professionals and people who want to become familiar with the exciting field of network security.
Dr. Dimitriou is a senior member of IEEE, ACM and a Fulbright fellow. He is also a Distinguished Lecturer for ACM.
Here are some recent conferences that I’m somehow involved. Older activities can be found here.
- 32nd International Conference on ICT Systems Security and Privacy Protection – IFIP SEC 2017, May 29-31, 2017, Rome, Italy.
- 14th International Conference on Security and Cryptography (SECRYPT 2017), 24-26 July 2017, Madrid, Spain.
- 5th International Symposium on Security in Computing and Communications (SSCC’17) 13-16 September, 2017, Manipal University, India.
- 13th International Conference on Security and Cryptography (SECRYPT 2016), 26-28 July 2016, Lisbon, Portugal.
- 10th International Conference on Emerging Security Information, Systems and Technologies (SECUREWARE 2016), July 24-28, 2016, Nice, France.
The Black Hat Collection
…Spy-Sense is a spyware tool that allows the injection of stealthy exploits in the heart of each node in a sensor network. Spy-Sense is undetectable, hard to recognize and get rid of, and once activated, it runs in a discrete background operation without interfering or disrupting normal network operation.
…SenSys is the first instance of an attack tool that can be used by an adversary to penetrate the confidentiality of a sensor network. It can analyze overheard radio messages and use this information to perform attacks such as Sinkhole, Replay/Modify Data, Selective Forwarding, Malicious Code Injection, etc… For more information, check out the Sensys web site!!!
…and more (a complete list can be found here)
- A paper on Privacy-Respecting Rewards for Participatory Sensing Applications. In IEEE Wireless Communications and Networking Conference. Barcelona, Spain, April 2018.
- A journal paper on Privacy-respecting auctions and rewarding mechanisms in mobile crowd-sensing applications. In Journal of Network and Computer Applications, Vol. 100, December 2017. https://doi.org/10.1016/j.jnca.2017.10.012
- A journal paper on Power efficient routing for Software Defined Networks (SDN). In Wiley International Journal of Network Management, 2017. https://doi.org/10.1002/nem.1972
A paper on Deniability in Location-Based Services. In 15th International Conference on
Cryptology and Network Security (CANS), Milan, Italy, November 2016.
- A journal paper on Imposter Detection in Mobile Sensor Networks. In Computer Networks, Volume 108, October 2016. http://dx.doi.org/10.1016/j.comnet.2016.08.019
- A journal paper on Secure and Scalable Aggregation in the Smart Grid. In Ad Hoc Networks, Elsevier, 2016. http://dx.doi.org/10.1016/j.adhoc.2016.06.014
- A journal paper on Enabling Anonymous Authorization and Rewarding in the Smart Grid. In IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2015. http://dx.doi.org/10.1109/TDSC.2015.2496211
- A journal paper on Key Evolving RFID Systems: Forward/Backward Privacy and Ownership Transfer of RFID tags. Ad Hoc Networks, Elsevier, 2015. http://dx.doi.org/10.1016/j.adhoc.2015.08.019
- A paper on "Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing". In the 9th IFIP/IEEE WISTP International Conference on Information Security Theory and Practice (WISTP 2015), August 24-25, 2015, Heraklion, Greece.
- A paper on "Imposter Detection for Replication Attacks on Mobile Sensor Networks". In the 7th IFIP/IEEE International Conference on New Technologies, Mobility and Security (NTMS 2015), July 17-29, 2015, Paris, France.
- A journal paper on A platform for privacy protection of data requesters and data providers in mobile sensing. Computer Communications, Elsevier, 2015. http://dx.doi.org/10.1016/j.comcom.2015.02.005
- A paper with Ghassan Karame on "Privacy-Friendly Planning of Energy Distribution in Smart Grids". In SEGS 2014, in association with the 21st ACM Conference on Computer and Communications Security, Arizona, USA. November 3 – 7, 2014.
- A paper on "Key Evolving RFID Systems: Forward Privacy and Ownership Transfer of RFID Tags". In 2014 IEEE RFID Technology and Applications (RFID-TA) Conference. Tampere, Finland, September 8-9, 2014
- A paper on "Secure and Scalable Aggregation in the Smart Grid". In the 6th IFIP/IEEE International Conference on New Technologies, Mobility and Security (NTMS 2014), March 30 to April 2, 2014, Dubai, UAE.
- LDAC: A Localized and Decentralized Algorithm for Efficiently Countering Wormholes in Mobile Wireless Networks. Journal of Computer and System Sciences, Elsevier, 2014. http://dx.doi.org/10.1016/j.jcss.2013.06.015
- A journal paper on Multi-Party Trust Computation in Decentralized Environments in the Presence of Malicious Adversaries. Ad Hoc Networks, Elsevier, 2013. http://dx.doi.org/10.1016/j.adhoc.2013.04.013
- Privacy-Respecting Discovery of Data Providers in Crowd-Sensing Applications. In the 9th IEEE International Conference on Distributed Computing in Sensor Systems (IEEE DCOSS), 20-23 May 2013, Cambridge, Massachusetts.
- Privacy-Friendly Tasking and Trading of Energy in Smart Grids. In 28th Symposium On Applied Computing (ACM SAC '13), March 18 – 22, 2013, Coimbra, Portugal.
- A paper on Preserving Querier's Privacy in Participatory Sensing. In the 4th International Conference on Security and Privacy in Mobile Information and Communication Systems (Mobisec 2012), Frankfurt, Germany, June 25-26, 2012
- A paper on Multi-Party Trust Computation in Decentralized Environments. In the 5th IFIP International Conference on New Technologies, Mobility and Security (NTMS 2012), Istanbul, Turkey, May 7-10, 2012.
- A journal paper on "Vulnerabilities of Decentralized Additive Reputation Systems." In Wireless Personal Communications Volume 66, Number 3 (2012), 559-575, 2012.
- A tool for Spying on Sensor Networks. BlackHat USA, Las Vegas, USA, August 1-4, 2011.
- A paper on Data Authentication for Unattended Wireless Sensor Networks. In the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11), Changsha, China, November 16-18, 2011.
- A journal paper on People-centric sensing in assistive healthcare. In Security and Communication Networks, Wiley. February, 2011.
- A paper on Privacy Preservation Schemes for Querying Wireless Sensor Networks. In the 7th IEEE International Workshop on Sensor Networks and Systems for Pervasive Computing (PerSeNS '11), March 21, 2011, Seattle, USA.
- A journal paper on Location Privacy in Urban Sensing Networks. In the IEEE Wireless Communications Magazine, Special Issue on Security and Privacy in Emerging Wireless Networks, October 2010.
- Tired of receiving spam? Read about our Email Spam-Combating System. In the 6th International ICST Conference on Security and Privacy in Communication Networks (SecureComm '10), September 7-9, 2010, Singapore.
- Preventing Wormhole attacks in Wireless Networks. In the 6th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS '10), June 21-23, 2010, Santa Barbara, California, USA.
- A journal paper on Securely Reprogramming Sensor Networks. In the International Journal of Sensor Networks (IJSNet), Special Issue on Technologies, Architectures and Applications for Green Wireless Sensor Networks, 2010.
- A tool for Attacking Sensor Networks. BlackHat Europe, Barcelona, Spain, April 12-15, 2010.
- A journal paper on Worm Propagation in Sensor Networks. The Computer Journal, Special Issue on Algorithms, Protocols, and Future Applications of Wireless Sensor Networks. Oxford University Press, 2010.
The material presented here is to ensure timely dissemination of scholarly and technical work. If it is going to be used for other than personal use, please contact the corresponding copyright owner…
Running for fun (but not profit)
Back in March 2010, I made a potentially life changing decision: I signed up for the 28th Athens Classic Marathon, honoring the 2,500 years anniversary from the Marathon Battle. Running a Marathon was something of a "dream" when I started running a couple of years ago, but always felt like a mission impossible… Most probably this challenge would prove to be way out of my league, but I figured if there was ever a time, now would be it! Fortunately, I was good for the challenge… So, here are some pictures from my first Marathon race… (as well as some subsequent ones…). Since then I ran a few more but I stopped posting them here…