Call for Papers: DIMVA 2017

14th International Conference on Detection of Intrusions and Malware & Vulnerability Assessment

 

6-7 July 2017, Bonn, Germany

 

Conference submission website is open!

 

Important dates:

Submission deadline (extended): 27 February 2017, 23:59:59 PST

Notification: 10 April 2017

Camera-ready version: 28 April 2017

Conference: 6-7 July 2017

 

General Information

The annual DIMVA conference serves as a premier forum for advancing the state of the art in the broader areas of intrusion detection, malware analysis, and vulnerability assessment. Each year, DIMVA brings together international experts from academia, industry, and government to present and discuss novel research in these areas. DIMVA is organized by the special interest group Security - Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI). The conference proceedings will appear in Springer Lecture Notes in Computer Science (LNCS) series.

DIMVA 2017 will be co-located with the ESSOS conference (3-5 July 2017).

 

Types of Submissions Solicited

DIMVA solicits submissions of high-quality, original scientific papers presenting novel research on malware analysis, intrusion detection, and related systems security topics. Submissions of two types are invited:

  • FULL PAPERS, presenting novel and mature research results. Full papers are limited to 20 pages in LNCS format, including bibliography and appendices.

  • SHORT PAPERS, presenting original, still ongoing work that has not yet reached the maturity required for a full paper. Short papers are limited to 10 pages in LNCS format, including bibliography and appendices. Short papers will be included in the proceedings. The title of short papers should start with the words "Extended Abstract".

 

Indicative topics of interest include (but are not limited to):

Intrusions

- Novel approaches and domains
- Insider detection
- Prevention and response
- Data leakage and exfiltration
- Result correlation and cooperation
- Evasion and other attacks
- Potentials and limitations
- Operational experiences
- Privacy, legal, and social aspects
- Targeted attacks

 

Malware
- Automated analyses
- Behavioral models
- Prevention and containment
- Classification
- Lineage
- Forensics and recovery
- Underground economy

 

Vulnerabilities
- Vulnerability detection
- Vulnerability prevention
- Vulnerability analysis
- Exploitation prevention
- Situational awareness
- Active probing