
July 09 - July 11, 2025
GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment
No followers yet.
Overview
The 22nd Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA '25) will be held from July 9 to 11, 2025, at Graz University of Technology, Austria. DIMVA serves as a premier forum for advancing the state of the art in intrusion detection, malware analysis, and vulnerability assessment, bringing together international experts from academia, industry, and government.
DIMVA 2025: Call for Papers
The 22nd Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA '25) will be held from July 9 to July 11, 2025, at Graz University of Technology, Austria.
General Information
The annual DIMVA conference is a premier forum for advancing the state of the art in intrusion detection, malware analysis, and vulnerability assessment. It brings together international experts from academia, industry, and government. DIMVA is organized by the special interest group Security - Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI). The conference proceedings will appear in the Springer Lecture Notes in Computer Science (LNCS) series.
Topics of Interest
DIMVA solicits submissions of high-quality, original scientific papers presenting novel research on malware analysis, intrusion detection, vulnerability assessment, and related systems security topics. Topics of interest include, but are not limited to:
Intrusions
- Novel approaches and domains
- Insider detection
- Prevention and response
- Data leakage, exfiltration, and poisoning
- Result correlation and cooperation
- Evasion and other attacks
- Potentials and limitation
- Operational experiences
- Privacy, legal, and social aspects
- Targeted attacks
- Analysis or detection of cryptocurrency heists
Malware
- Automated analyses
- Behavioral models
- Prevention and containment
- Classification
- Lineage
- Forensics and recovery
- Underground economy
- Vulnerabilities in malware
- Financially targeted malware (e.g., ransomware, DeFi)
Vulnerabilities
- Vulnerability detection
- Vulnerability prevention
- Vulnerability analysis
- Exploitation and defenses
- Hardware vulnerabilities
- Situational awareness
- Active probing
- Vulnerabilities in decentralized systems
Papers will be judged on novelty, significance, correctness, and clarity. Reproducibility of experimental results is expected. Papers that bridge research in different communities and experience papers are also welcome.
Types of Submissions Solicited
- Full Papers: Present novel and mature research results. Limited to 20 pages in Springer LNCS format, including bibliography and appendices. Papers not following formatting guidelines may be rejected without review.
- Posters: For presenting original, ongoing work that has not yet reached maturity for a full paper. Poster submissions require a poster draft and an accompanying poster paper (4-6 pages, LNCS format). Poster papers will be published in the proceedings.
Submission Guidelines
- Double-blind reviewing process: All submissions must be appropriately anonymized. Author names and affiliations must be excluded, and self-references should be avoided or cited in the third person.
- Originality: Submissions must be original work and not under submission to another venue.
- Presentation: At least one author of each accepted paper must physically present the work at the conference for it to be included in the proceedings.
- Code Submission: Authors are encouraged to submit anonymized code, e.g., via https://anonymous.4open.science/.
Ethical Considerations
- Human Subjects: Disclose IRB approval and measures to minimize privacy risks if experiments involve human subjects.
- Vulnerability Research: Discuss steps taken to avoid negatively affecting third parties and plans for responsible disclosure before publication.
Important Dates (AoE)
Cycle 1:
- Submission: December 10, 2024
- Notification (accept/reject): January 27, 2025
Cycle 2:
-
Submission: February 19, 2024
-
Notification (accept/reject): April 2, 2025
-
Camera ready deadline: April 30, 2025
-
Conference: July 9 to 11, 2025
Submission Sites
- Full Papers (Cycle 1): https://dimva25.hotcrp.com/
- Full Papers (Cycle 2): https://dimva25r2.hotcrp.com/
- Posters: https://dimva25posters.hotcrp.com/
Registration
- Registration is open until July 1st. On-site registration is not possible.
- At least one Member or Regular fee must be paid for each accepted paper; otherwise, papers will be withdrawn.
- Registration fees include admission to all sessions, selected meals, welcome reception, dinner, and social event.
- Cancellation/Refunds: Must be received no later than July 1, 2025.
- Fees:
- Regular: 340 EUR (Normal) / 390 EUR (Late, starting June 7th)
- GI members and other scientific organization members: 260 EUR (Normal) / 310 EUR (Late)
- B.Sc./M.Sc. Student: 270 EUR (Normal) / 320 EUR (Late)
- Registration Link: https://pretix.eu/gi/DIMVA25/
- Contact for questions: dimva25.isec@tugraz.at
CAUTION: Beware of phishing emails regarding hotel bookings. Only use official channels for conference matters.
Committee
- Program Co-chairs: Manuel Egele, Veelasha Moonsamy
- Email: pc-chairs@dimva.org
- General Chair: Daniel Gruss (Graz University of Technology)
- Publication Chair: Michele Carminati
- Poster Co-chairs: Tarini Saka, Flavio Toffalini
- Program Committee: A comprehensive list is available on the conference website.
Conference Dates
Conference Date
July 9, 2025 → July 11, 2025
Registration
Registration will be open until
July 1, 2025
Other Dates
Cycle 2: Submission
February 19, 2024
Cycle 1: Submission
December 10, 2024
Cycle 1: Notification (accept/reject)
January 27, 2025
Source Rank
Source: CORE2023
Rank: C
Field of Research: Cybersecurity and privacy, No longer used