14th International Conference on Detection of Intrusions and Malware & Vulnerability Assessment

DIMVA 2017


Computer Security & Cryptography Security & Trust & Testing



Call for Papers: DIMVA 2017
14th International Conference on Detection of Intrusions and Malware & Vulnerability Assessment
6-7 July 2017, Bonn, Germany
Important dates:
Submission deadline: 22 February 2017, 23:59:59 PST
Notification: 10 April 2017
Camera-ready version: 28 April 2017
Conference: 6-7 July 2017
General Information
The annual DIMVA conference serves as a premier forum for advancing the state of the art in the broader areas of intrusion detection, malware analysis, and vulnerability assessment. Each year, DIMVA brings together international experts from academia, industry, and government to present and discuss novel research in these areas. DIMVA is organized by the special interest group Security - Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI). The conference proceedings will appear in Springer Lecture Notes in Computer Science (LNCS) series.
DIMVA 2017 will be co-located with the ESSOS conference (3-5 July 2017).
Types of Submissions Solicited
DIMVA solicits submissions of high-quality, original scientific papers presenting novel research on malware analysis, intrusion detection, and related systems security topics. Submissions of two types are invited:
FULL PAPERS, presenting novel and mature research results. Full papers are limited to 20 pages in LNCS format, including bibliography and appendices.
SHORT PAPERS, presenting original, still ongoing work that has not yet reached the maturity required for a full paper. Short papers are limited to 10 pages in LNCS format, including bibliography and appendices. Short papers will be included in the proceedings. The title of short papers should start with the words "Extended Abstract".
Indicative topics of interest include (but are not limited to):
Intrusions
- Novel approaches and domains
- Insider detection
- Prevention and response
- Data leakage and exfiltration
- Result correlation and cooperation
- Evasion and other attacks
- Potentials and limitations
- Operational experiences
- Privacy, legal, and social aspects
- Targeted attacks
Malware
- Automated analyses
- Behavioral models
- Prevention and containment
- Classification
- Lineage
- Forensics and recovery
- Underground economy
Vulnerabilities
- Vulnerability detection
- Vulnerability prevention
- Vulnerability analysis
- Exploitation prevention
- Situational awareness
- Active probing