logo

09. Juli - 11. Juli 2025

Rang: C (CORE2023)Offline

GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment

Aktualisiert: about 2 months ago
2.7 (6 Bewertungen)

Noch keine Follower.

Übersicht

The 22nd Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA '25) will be held from July 9 to 11, 2025, at Graz University of Technology, Austria. DIMVA serves as a premier forum for advancing the state of the art in intrusion detection, malware analysis, and vulnerability assessment, bringing together international experts from academia, industry, and government.

Call for Papers

DIMVA 2025: Call for Papers

The 22nd Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA '25) will be held from July 9 to July 11, 2025, at Graz University of Technology, Austria.

General Information

The annual DIMVA conference is a premier forum for advancing the state of the art in intrusion detection, malware analysis, and vulnerability assessment. It brings together international experts from academia, industry, and government. DIMVA is organized by the special interest group Security - Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI). The conference proceedings will appear in the Springer Lecture Notes in Computer Science (LNCS) series.

Topics of Interest

DIMVA solicits submissions of high-quality, original scientific papers presenting novel research on malware analysis, intrusion detection, vulnerability assessment, and related systems security topics. Topics of interest include, but are not limited to:

Intrusions

  • Novel approaches and domains
  • Insider detection
  • Prevention and response
  • Data leakage, exfiltration, and poisoning
  • Result correlation and cooperation
  • Evasion and other attacks
  • Potentials and limitation
  • Operational experiences
  • Privacy, legal, and social aspects
  • Targeted attacks
  • Analysis or detection of cryptocurrency heists

Malware

  • Automated analyses
  • Behavioral models
  • Prevention and containment
  • Classification
  • Lineage
  • Forensics and recovery
  • Underground economy
  • Vulnerabilities in malware
  • Financially targeted malware (e.g., ransomware, DeFi)

Vulnerabilities

  • Vulnerability detection
  • Vulnerability prevention
  • Vulnerability analysis
  • Exploitation and defenses
  • Hardware vulnerabilities
  • Situational awareness
  • Active probing
  • Vulnerabilities in decentralized systems

Papers will be judged on novelty, significance, correctness, and clarity. Reproducibility of experimental results is expected. Papers that bridge research in different communities and experience papers are also welcome.

Types of Submissions Solicited

  • Full Papers: Present novel and mature research results. Limited to 20 pages in Springer LNCS format, including bibliography and appendices. Papers not following formatting guidelines may be rejected without review.
  • Posters: For presenting original, ongoing work that has not yet reached maturity for a full paper. Poster submissions require a poster draft and an accompanying poster paper (4-6 pages, LNCS format). Poster papers will be published in the proceedings.

Submission Guidelines

  • Double-blind reviewing process: All submissions must be appropriately anonymized. Author names and affiliations must be excluded, and self-references should be avoided or cited in the third person.
  • Originality: Submissions must be original work and not under submission to another venue.
  • Presentation: At least one author of each accepted paper must physically present the work at the conference for it to be included in the proceedings.
  • Code Submission: Authors are encouraged to submit anonymized code, e.g., via https://anonymous.4open.science/.

Ethical Considerations

  • Human Subjects: Disclose IRB approval and measures to minimize privacy risks if experiments involve human subjects.
  • Vulnerability Research: Discuss steps taken to avoid negatively affecting third parties and plans for responsible disclosure before publication.

Important Dates (AoE)

Cycle 1:

  • Submission: December 10, 2024
  • Notification (accept/reject): January 27, 2025

Cycle 2:

  • Submission: February 19, 2024

  • Notification (accept/reject): April 2, 2025

  • Camera ready deadline: April 30, 2025

  • Conference: July 9 to 11, 2025

Submission Sites

Registration

  • Registration is open until July 1st. On-site registration is not possible.
  • At least one Member or Regular fee must be paid for each accepted paper; otherwise, papers will be withdrawn.
  • Registration fees include admission to all sessions, selected meals, welcome reception, dinner, and social event.
  • Cancellation/Refunds: Must be received no later than July 1, 2025.
  • Fees:
    • Regular: 340 EUR (Normal) / 390 EUR (Late, starting June 7th)
    • GI members and other scientific organization members: 260 EUR (Normal) / 310 EUR (Late)
    • B.Sc./M.Sc. Student: 270 EUR (Normal) / 320 EUR (Late)
  • Registration Link: https://pretix.eu/gi/DIMVA25/
  • Contact for questions: dimva25.isec@tugraz.at

CAUTION: Beware of phishing emails regarding hotel bookings. Only use official channels for conference matters.

Committee

  • Program Co-chairs: Manuel Egele, Veelasha Moonsamy
  • General Chair: Daniel Gruss (Graz University of Technology)
  • Publication Chair: Michele Carminati
  • Poster Co-chairs: Tarini Saka, Flavio Toffalini
  • Program Committee: A comprehensive list is available on the conference website.

Wichtige Termine

Konferenzdaten

Conference Date

9. Juli 202511. Juli 2025

Anmeldung

Registration will be open until

1. Juli 2025

Andere Termine

Cycle 2: Submission

19. Februar 2024

Cycle 1: Submission

10. Dezember 2024

Cycle 1: Notification (accept/reject)

27. Januar 2025

Quellenrang

Quelle: CORE2023

Rang: C

Forschungsgebiet: Cybersecurity and privacy, Nicht mehr verwendet

Karte

Loading feedback section...