posted by user: phretor || 1085 views || tracked by 6 users: [display]

DIMVA 2024 : 21st Conference on Detection of Intrusions and Malware & Vulnerability Assessment


When Jul 17, 2024 - Jul 19, 2024
Where EPFL, Lausanne, Switzerland
Submission Deadline Dec 6, 2023
Notification Due Apr 4, 2024
Final Version Due Apr 17, 2024

Call For Papers

### Important Dates (AoE)

* Cycle 1:
* Submission: Dec 6, 2023
* Notification (accept/reject/revision): Jan 24, 2024
* Cycle 2:
* Submission: Feb 14, 2024
* Notification (accept/revision/revision): Apr 4, 2024
* Camera ready deadline: Apr 17, 2024
* Conference: July 17 to 19, 2024

### General Information

The annual DIMVA conference serves as a premier forum for advancing the state of the art in the broader areas of intrusion detection, malware analysis, and vulnerability assessment. Each year, DIMVA brings together international experts from academia, industry, and government to present and discuss novel research in these areas. DIMVA is organized by the special interest group Security – Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI). The conference proceedings will appear in the Springer Lecture Notes in Computer Science (LNCS) series.

### Topics of Interest

DIMVA solicits submissions of high-quality, original scientific papers presenting novel research on malware analysis, intrusion detection, vulnerability assessment, and related systems security topics.

**Special topic: Generative AI.** We encourage submissions about security issues of generative AI to solve intrusion, malware, or vulnerability detection related challenges; or security of generative AI applications. Submissions in this special topic will be reviewed with the same criteria as any other submission.

Topics of interest include, but are not limited to:

#### Intrusions

* Novel approaches and domains
* Insider detection
* Prevention and response
* Data leakage, exfiltration, and poisoning
* Result correlation and cooperation
* Evasion and other attacks
* Potentials and limitation
* Operational experiences
* Privacy, legal, and social aspects
* Targeted attacks
* Analysis or detection of cryptocurrency heists

#### Malware

* Automated analyses
* Behavioral models
* Prevention and containment
* Classification
* Lineage
* Forensics and recovery
* Underground economy
* Vulnerabilities in malware
* Financially targeted malware (e.g., ransomware, DeFi)

#### Vulnerability detection

* Vulnerability prevention
* Vulnerability analysis
* Exploitation and defenses
* Hardware vulnerabilities
* Situational awareness
* Active probing
* Vulnerabilities in decentralized systems

Papers will be judged on novelty, significance, correctness, and clarity. We expect all papers to provide enough details to enable reproducibility of the experimental results. We encourage papers that bridge research in different communities. We also welcome experience papers that clearly articulate lessons learnt.

### Types of Submissions Solicited

We invite submissions of two types:

**Full Paper:** presenting novel and mature research results. Full papers are limited to 20 pages in Springer LNCS format, including bibliography and appendices.

**Short Paper:** presenting original, still ongoing work that has not yet reached the maturity required for a full paper. Short papers are limited to 10 pages in Springer LNCS format, including bibliography and appendices. Short papers will be included in the proceedings. The title of short papers must start with the words “Extended Abstract”.

Papers that do not follow the above formatting guidelines may be rejected without review.

### Submission Guidelines

DIMVA 2024 will adopt a double-blind reviewing process. All submissions should be appropriately anonymized. Author names and affiliations must be excluded from the paper. Furthermore, authors should avoid obvious self-references, and should cite their own previous work in third person, whenever necessary. Papers that are not properly anonymized risk being rejected without review.

Submissions must be original work and may not be under submission to another venue at the time of review. At least one author of each accepted paper is required to physically present the submitted work at the conference, for the paper to be included in the proceedings.

Authors are encouraged to submit code appropriately anonymized, using, e.g., [](

Papers can be submitted using [](

### Ethical considerations

Submissions that report experiments with data gathered from human subjects should disclose whether the research received approval from an institutional ethics review board (IRB), if applicable, and what measures were adopted to minimize risks to privacy.

Submissions that describe experiments related to vulnerabilities in software or systems should discuss the steps taken to avoid negatively affecting any third-parties (e.g., in case of probing of network devices), and how the authors plan to responsibly disclose the vulnerabilities to the appropriate software or system vendors or owners before publication.

If you have any questions, please contact the program chairs at [](

Related Resources

ICSC 2024   The Fourth Intelligent Cybersecurity Conference
DDSW 2024   The 5nd International Workshop on Data-Driven Security (DDSW 2024)
RAID 2024   The 27th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2024)
DS 2024   Discovery Science 2024
EASE 2024   28th International Conference on Evaluation and Assessment in Software Engineering
TRS 2025   Transportation Research Symposium
TAL-ALD 2024   Special issue of the journal Traitement Automatique des Langues (TAL) Abusive Language Detection : Linguistic Resources, Methods and Applications
Social Sustainability 2025   Twenty-first International Conference on Environmental, Cultural, Economic & Social Sustainability
NovelIQA 2024   Novel Approaches to Image Quality Assessment
ISCMI 2024   2024 11th International Conference on Soft Computing & Machine Intelligence (ISCMI 2024)