posted by user: dlsec2018 || 2351 views || tracked by 10 users: [display]

DIMVA 2019 : 16th International Conference on Detection of Intrusions and Malware & Vulnerability Assessment


When Jun 19, 2019 - Jun 20, 2019
Where Gothenburg, Sweden
Submission Deadline Feb 22, 2019
Notification Due Apr 12, 2019
Final Version Due Apr 22, 2019
Categories    security   MALWARE   vulnerabilities   intrusion detection

Call For Papers

16th International Conference on
Detection of Intrusions and Malware & Vulnerability Assessment

Gothenburg, Sweden - 19-20 June, 2019


# Important Dates:

- Paper Submission Deadline: 22 February 2019, 23:59:59 EST (Extended)
- Notification to Authors: 12 April 2019
- Final Paper Submission Deadline: 22 April 2019
- Conference: 19-20 June 2019

# General Information

The annual DIMVA conference serves as a premier forum for advancing the state
of the art in the broader areas of intrusion detection, malware analysis, and
vulnerability assessment. Each year, DIMVA brings together international
experts from academia, industry, and government to present and discuss novel
research in these areas. DIMVA is organized by the special interest group
Security - Intrusion Detection and Response (SIDAR) of the German Informatics
Society (GI). The conference proceedings will appear in Springer Lecture Notes
in Computer Science (LNCS) series.

# Types of Submissions Solicited:

DIMVA solicits submissions of high-quality, original scientific papers
presenting novel research on malware analysis, intrusion detection,
vulnerability assessment, and related systems security topics. Submissions of
two types are invited:

FULL PAPERS, presenting novel and mature research results. Full papers are
limited to 20 pages in Springer LNCS format, including bibliography and

SHORT PAPERS, presenting original, still ongoing work that has not yet reached
the maturity required for a full paper. Short papers are limited to 10 pages in
LNCS format, including bibliography and appendices. Short papers will be
included in the proceedings. The title of short papers must start with the words
"Extended Abstract".

Papers that do not follow the above formatting guidelines may be rejected
without review.

# Indicative topics of interest include (but are not limited to):

## Intrusions
- Novel approaches and domains
- Insider detection
- Prevention and response
- Data leakage, exfiltration, and poisoning
- Result correlation and cooperation
- Evasion and other attacks
- Potentials and limitations
- Operational experiences
- Privacy, legal, and social aspects
- Targeted attacks

## Malware
- Automated analyses
- Behavioral models
- Prevention and containment
- Classification
- Lineage
- Forensics and recovery
- Underground economy
- Vulnerabilities in malware

## Vulnerability detection
- Vulnerability prevention
- Vulnerability analysis
- Exploitation and defenses
- Hardware vulnerabilities
- Situational awareness
- Active probing

Papers will be judged on novelty, significance, correctness, and clarity.
We expect all papers to provide enough detail to enable reproducibility of the
experimental results. We encourage papers that bridge research in different
communities. We also welcome experience papers that clearly articulate lessons

# Submission Guidelines:

DIMVA 2019 will adopt a double-blind reviewing process. All submissions should
be appropriately anonymized. Author names and affiliations must be excluded
from the paper. Furthermore, authors should avoid obvious self-references, and
should cite their own previous work in third person, whenever necessary. Papers
that are not properly anonymized risk being rejected without review.

Submissions must be original work and may not be under submission to another
venue at the time of review. At least one author of each accepted paper is
required to physically present the submitted work at the conference, for the paper
to be included in the proceedings.

Papers can be submitted using the following submission website:

# Ethical Considerations:

Submissions that report experiments with data gathered from human subjects
should disclose whether the research received approval from an institutional
ethics review board (IRB), if applicable, and what measures were adopted to
minimize risks to privacy.

Submissions that describe experiments related to vulnerabilities in software or
systems should discuss the steps taken to avoid negatively affecting any
third-parties (e.g., in case of probing of network devices), and how the authors
plan to responsibly disclose the vulnerabilities to the appropriate software or
system vendors or owners before publication.

If you have any questions, please contact the program chairs at

# Organizing Committee

## General Chair
Magnus Almgren, Chalmers University of Technology, Sweden

## Program Chair
Roberto Perdisci, University of Georgia and Georgia Institute of Technology, USA

## Program Co-Chair
Clémentine Maurice, CNRS, IRISA, France

## Publications Chair
Giorgio Giacinto, University of Cagliari, Italy

## Publicity Chair
Kyu Hyung Lee, University of Georgia, USA

## Sponsor Chair
Xavier Bellekens, Abertay University, UK

# Program Committee

Manos Antonakakis, Georgia Institute of Technology, USA
Marco Balduzzi, Trend Micro Research, Italy
Leyla Bilge, Symantec Research Labs, France
Lorenzo Cavallaro, King's College London, UK
Gabriela Ciocarlie, SRI International, USA
Baris Coskun, Amazon Web Services, USA
Lorenzo De Carli, Worcester Polytechnic Institute, USA
Hervé Debar, Telecom SudParis, France
Sven Dietrich, City University of New York, USA
Brendan Dolan-Gavitt, NYU, USA
Adam Doupé, Arizona State University, USA
Manuel Egele, Boston University, USA
Ulrich Flegel, Infineon Technologies AG, Germany
Yanick Fratantonio, Eurecom, France
Giorgio Giacinto, University of Cagliari, Italy
Neil Gong, Iowa State University, USA
Thorsten Holz, Ruhr-Universität Bochum, Germany
Kyu Hyung Lee, University of Georgia, USA
Sotiris Ioannidis, FORTH, Greece
Vasileios Kemerlis, Brown University, USA
Katharina Krombholz, CISPA Helmholtz Center (i.G.), Germany
Andrea Lanzi, University of Milan, Italy
Corrado Leita, Lastline, UK
Zhiqiang Lin, Ohio State University, USA
Martina Lindorfer, TU Wien, Austria
Xiapu Luo, The Hong Kong Polytechnic University, HK
Federico Maggi, Trend Micro Research, Italy
Michael Meier, University of Bonn and Fraunhofer FKIE, Germany
Jelena Mirkovic, USC ISI, USA
Nick Nikiforakis, Stony Brook University, USA
Anita Nikolich, Illinois Institute of Technology, USA
Daniela Oliveira, University of Florida, USA
Christina Poepper, New York University Abu Dhabi, UAE
Georgios Portokalidis, Stevens Institute of Technology, USA
Christian Rossow, CISPA Helmholtz Center i.G., Germany
Deborah Shands, SRI International, USA
Kapil Singh, IBM T.J. Watson Research Center, USA
Gianluca Stringhini, Boston University, USA
Juan Tapiador, Universidad Carlos III, Spain
Heng Yin, University of California Riverside, USA
Stefano Zanero, Politecnico di Milano, Italy

# Steering Committee

## Chairs
Ulrich Flegel, Infineon Technologies, Germany
Michael Meier, University of Bonn and Fraunhofer FKIE, Germany

## Members
Magnus Almgren, Chalmers University of Technology, Sweden
Sébastien Bardin, CEA, France
Gregory Blanc, Télécom SudParis, France
Herbert Bos, Vrije Universiteit Amsterdam, Netherlands
Danilo M. Bruschi, Universita degli Studi di Milano, Italy
Roland Bueschkes, RWE AG, Germany
Juan Caballero, IMDEA Software Institute, Spain
Lorenzo Cavallaro, King’s College London, UK
Hervé Debar, Télécom SudParis, France
Sven Dietrich, City University of New York, USA
Cristiano Giuffrida, Vrije Universiteit Amsterdam, Netherlands
Bernhard Haemmerli, Acris GmbH and HSLU Lucerne, Switzerland
Thorsten Holz, Ruhr-University Bochum, Germany
Marko Jahnke, CSIRT, German Federal Authority, Germany
Klaus Julisch, Deloitte, Switzerland
Christian Kreibich, ICSI, USA
Christopher Kruegel, UC Santa Barbara, USA
Pavel Laskov, University of Liechtenstein, Liechtenstein
Federico Maggi, Trend Micro Research, Italy
Michalis Polychronakis, Stony Brook University, USA
Konrad Rieck, TU Braunschweig, Germany
Jean-Pierre Seifert, Technical University Berlin, Germany
Robin Sommer, ICSI/LBNL, USA
Urko Zurutuza, Mondragon University, Spain

# Sponsorship Opportunities

We solicit interested organizations to serve as sponsors for DIMVA 2019.
Please contact the sponsor chair ( for details regarding
sponsorship opportunities.

Related Resources

DaKM 2019   4th International Conference on Data Mining & Knowledge Management
MaL2CSec 2019   Workshop on Machine Learning for Cyber-Crime Investigation and Cybersecurity
SCAI 2019   8th International Conference On Soft Computing, Artificial Intelligence And Applications
RAID 2019   International Symposium on Research in Attacks, Intrusions and Defenses
RADIMCC 2019   Special Issue: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes (J.UCS)
CCS - May 2019   CCS 2019 : 26th ACM Conference on Computer and Communications Security - May Deadline
Cyber Security 2019   International Conference on Cyber Security and Protection of Digital Services
CyberSA 2019   IEEE International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA 2019)
IPPR 2019   5th International Conference on Image Processing and Pattern Recognition