DIMVA 2019 : 16th International Conference on Detection of Intrusions and Malware & Vulnerability Assessment

  in Conferences   Posted on December 30, 2018

Conference Information

Submission Deadline Monday 18 Feb 2019
Conference & Submission Link https://www.dimva2019.org/
Conference Dates Jun 19, 2019 - Jun 20, 2019
Conference Address Gothenburg, Sweden
Proceedings indexed by
Conference Organizers : ( Deadline extended ? Click here to edit )

Conference Call for Papers

16th International Conference on

Detection of Intrusions and Malware & Vulnerability Assessment

Gothenburg, Sweden – 19-20 June, 2019



(This CFP is available in PDF format at https://goo.gl/pYvCqW)

# Important Dates:

– Paper Submission Deadline: 18 February 2019, 23:59:59 UTC

– Notification to Authors: 12 April 2019

– Final Paper Submission Deadline: 22 April 2019

– Conference: 19-20 June 2019

# General Information

The annual DIMVA conference serves as a premier forum for advancing the state

of the art in the broader areas of intrusion detection, malware analysis, and

vulnerability assessment. Each year, DIMVA brings together international

experts from academia, industry, and government to present and discuss novel

research in these areas. DIMVA is organized by the special interest group

Security – Intrusion Detection and Response (SIDAR) of the German Informatics

Society (GI). The conference proceedings will appear in Springer Lecture Notes

in Computer Science (LNCS) series.

# Types of Submissions Solicited:

DIMVA solicits submissions of high-quality, original scientific papers

presenting novel research on malware analysis, intrusion detection,

vulnerability assessment, and related systems security topics. Submissions of

two types are invited:

FULL PAPERS, presenting novel and mature research results. Full papers are

limited to 20 pages in Springer LNCS format, including bibliography and


SHORT PAPERS, presenting original, still ongoing work that has not yet reached

the maturity required for a full paper. Short papers are limited to 10 pages in

LNCS format, including bibliography and appendices. Short papers will be

included in the proceedings. The title of short papers must start with the words

\”Extended Abstract\”.

Papers that do not follow the above formatting guidelines may be rejected

without review.

# Indicative topics of interest include (but are not limited to):

## Intrusions

– Novel approaches and domains

– Insider detection

– Prevention and response

– Data leakage, exfiltration, and poisoning

– Result correlation and cooperation

– Evasion and other attacks

– Potentials and limitations

– Operational experiences

– Privacy, legal, and social aspects

– Targeted attacks

## Malware

– Automated analyses

– Behavioral models

– Prevention and containment

– Classification

– Lineage

– Forensics and recovery

– Underground economy

– Vulnerabilities in malware

## Vulnerability detection

– Vulnerability prevention

– Vulnerability analysis

– Exploitation and defenses

– Hardware vulnerabilities

– Situational awareness

– Active probing

Papers will be judged on novelty, significance, correctness, and clarity.

We expect all papers to provide enough detail to enable reproducibility of the

experimental results. We encourage papers that bridge research in different

communities. We also welcome experience papers that clearly articulate lessons


Submissions must be original work and may not be under submission to another

venue at the time of review. For further details on the submission process,

please visit the conference website: https://www.dimva2019.org

At least one author of each accepted paper is required to physically present

the submitted work at the conference, for the paper to be included in the


# Ethical Considerations:

Submissions that report experiments with data gathered from human subjects

should disclose whether the research received approval from an institutional

ethics review board (IRB), if applicable, and what measures were adopted to

minimize risks to privacy.

Submissions that describe experiments related to vulnerabilities in software or

systems should discuss the steps taken to avoid negatively affecting any

third-parties (e.g., in case of probing of network devices), and how the authors

plan to responsibly disclose the vulnerabilities to the appropriate software or

system vendors or owners before publication.

If you have any questions, please contact the program chairs at


# Organizing Committee

## General Chair

Magnus Almgren, Chalmers University of Technology, Sweden

## Program Chair

Roberto Perdisci, University of Georgia and Georgia Institute of Technology, USA

## Program Co-Chair

Clémentine Maurice, CNRS, IRISA, France

## Publications Chair

Giorgio Giacinto, University of Cagliari, Italy

## Publicity Chair

Kyu Hyung Lee, University of Georgia, USA

# Program Committee

Manos Antonakakis, Georgia Institute of Technology, USA

Marco Balduzzi, Trend Micro Research, Italy

Leyla Bilge, Symantec Research Labs, France

Lorenzo Cavallaro, King\’s College London, UK

Gabriela Ciocarlie, SRI International, USA

Baris Coskun, Amazon Web Services, USA

Lorenzo De Carli, Worcester Polytechnic Institute, USA

Hervé Debar, Telecom SudParis, France

Sven Dietrich, City University of New York, USA

Brendan Dolan-Gavitt, NYU, USA

Adam Doupé, Arizona State University, USA

Manuel Egele, Boston University, USA

Ulrich Flegel, Infineon Technologies AG, Germany

Yanick Fratantonio, Eurecom, France

Giorgio Giacinto, University of Cagliari, Italy

Neil Gong, Iowa State University, USA

Thorsten Holz, Ruhr-Universität Bochum, Germany

Kyu Hyung Lee, University of Georgia, USA

Sotiris Ioannidis, FORTH, Greece

Vasileios Kemerlis, Brown University, USA

Katharina Krombholz, CISPA Helmholtz Center (i.G.), Germany

Andrea Lanzi, University of Milan, Italy

Corrado Leita, Lastline, UK

Zhiqiang Lin, Ohio State University, USA

Martina Lindorfer, TU Wien, Austria

Xiapu Luo, The Hong Kong Polytechnic University, HK

Federico Maggi, Trend Micro Research, Italy

Michael Meier, University of Bonn and Fraunhofer FKIE, Germany

Jelena Mirkovic, USC ISI, USA

Nick Nikiforakis, Stony Brook University, USA

Anita Nikolich, Illinois Institute of Technology, USA

Daniela Oliveira, University of Florida, USA

Christina Poepper, New York University Abu Dhabi, UAE

Georgios Portokalidis, Stevens Institute of Technology, USA

Christian Rossow, CISPA Helmholtz Center i.G., Germany

Deborah Shands, SRI International, USA

Kapil Singh, IBM T.J. Watson Research Center, USA

Gianluca Stringhini, Boston University, USA

Juan Tapiador, Universidad Carlos III, Spain

Heng Yin, University of California Riverside, USA

Stefano Zanero, Politecnico di Milano, Italy

# Steering Committee

## Chairs

Ulrich Flegel, Infineon Technologies, Germany

Michael Meier, University of Bonn and Fraunhofer FKIE, Germany

## Members

Magnus Almgren, Chalmers University of Technology, Sweden

Sébastien Bardin, CEA, France

Gregory Blanc, Télécom SudParis, France

Herbert Bos, Vrije Universiteit Amsterdam, Netherlands

Danilo M. Bruschi, Universita degli Studi di Milano, Italy

Roland Bueschkes, RWE AG, Germany

Juan Caballero, IMDEA Software Institute, Spain

Lorenzo Cavallaro, King’s College London, UK

Hervé Debar, Télécom SudParis, France

Sven Dietrich, City University of New York, USA

Cristiano Giuffrida, Vrije Universiteit Amsterdam, Netherlands

Bernhard Haemmerli, Acris GmbH and HSLU Lucerne, Switzerland

Thorsten Holz, Ruhr-University Bochum, Germany

Marko Jahnke, CSIRT, German Federal Authority, Germany

Klaus Julisch, Deloitte, Switzerland

Christian Kreibich, ICSI, USA

Christopher Kruegel, UC Santa Barbara, USA

Pavel Laskov, University of Liechtenstein, Liechtenstein

Federico Maggi, Trend Micro Research, Italy

Michalis Polychronakis, Stony Brook University, USA

Konrad Rieck, TU Braunschweig, Germany

Jean-Pierre Seifert, Technical University Berlin, Germany

Robin Sommer, ICSI/LBNL, USA

Urko Zurutuza, Mondragon University, Spain

# Sponsorship Opportunities

We solicit interested organizations to serve as sponsors for DIMVA 2019.

Please contact the sponsor chair (sponsor-chair@dimva.org) for details regarding

sponsorship opportunities.

Other Conferences in Sweden

ISA 2019 : 15th Joint ACL - ISO Workshop on Interoperable Semantic Annotation

Deadline :
Fri 15 Feb 2019
May 23, 2019 - May 23, 2019 - Göteborg

HotCloudPerf 2019 : The Second Workshop on Hot Topics in Cloud Computing Performance

Deadline :
Fri 01 Mar 2019
Jun 16, 2019 - Jun 16, 2019 - Umea

EuroSPEC 2019 : 2019 European Workshop on Security and Privacy in Edge Computing

Deadline :
Fri 01 Mar 2019
Jun 16, 2019 - Jun 16, 2019 - KTH


Deadline :
Fri 08 Mar 2019
Jun 16, 2019 - Jun 20, 2019 - UMEÅ