Conference Information
DIMVA 2019: International Conference on Detection of Intrusions and Malware & Vulnerability Assessment
Submission Date:
2019-02-22 Extended
Notification Date:
Conference Date:
Gothenburg, Sweden
CCF: c   CORE: c   QUALIS: b1   Viewed: 10316   Tracked: 33   Attend: 0

Conference Location
Call For Papers
General Information

The annual DIMVA conference serves as a premier forum for advancing the state of the art in the broader areas of intrusion detection, malware analysis, and vulnerability assessment. Each year, DIMVA brings together international experts from academia, industry, and government to present and discuss novel research in these areas. DIMVA is organized by the special interest group Security – Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI). The conference proceedings will appear in Springer Lecture Notes in Computer Science (LNCS) series.
Types of Submissions Solicited:

DIMVA solicits submissions of high-quality, original scientific papers presenting novel research on malware analysis, intrusion detection, vulnerability assessment, and related systems security topics. Submissions of two types are invited:

FULL PAPERS, presenting novel and mature research results. Full papers are limited to 20 pages in Springer LNCS format, including bibliography and appendices.

SHORT PAPERS, presenting original, still ongoing work that has not yet reached the maturity required for a full paper. Short papers are limited to 10 pages in LNCS format, including bibliography and appendices. Short papers will be included in the proceedings. The title of short papers must start with the words “Extended Abstract”.

Papers that do not follow the above formatting guidelines may be rejected without review.

Indicative topics of interest include (but are not limited to):


    Novel approaches and domains
    Insider detection
    Prevention and response
    Data leakage and exfiltration
    Result correlation and cooperation
    Evasion and other attacks
    Potentials and limitation
    Operational experiences
    Privacy, legal, and social aspects
    Targeted attacks


    Automated analyses
    Behavioral models
    Prevention and containment
    Forensics and recovery
    Underground economy

Vulnerability detection

    Vulnerability prevention
    Vulnerability analysis
    Exploitation and prevention
    Hardware vulnerabilities
    Situational awareness
    Active probing

Papers will be judged on novelty, significance, correctness, and clarity. We expect all papers to provide enough detail to enable reproducibility of the experimental results. We encourage papers that bridge research in different communities. We also welcome experience papers that clearly articulate lessons learnt.

Submissions must be original work and may not be under submission to another venue at the time of review. For further details on the submission process, please visit the conference website:

At least one author of each accepted paper is required to physically present the submitted work at the conference, for the paper to be included in the proceedings.

Ethical Considerations:

Submissions that report experiments with data gathered from human subjects should disclose whether the research received approval from the an institutional ethics review boards (IRB), if applicable, and what measures were adopted to minimize risks to privacy.

Submissions that describe experiments related to vulnerabilities in software or systems should discuss the steps taken to avoid negatively affecting any third-parties (e.g., in case of probing of network devices), and how the authors plan to disclose the vulnerabilities to the appropriate software or system vendors or owners.

If you have any questions, please contact the program chairs at
Last updated by Dou Sun in 2019-02-14
Acceptance Ratio
Related Conferences