Call for Papers

DIMVA’19, Gothenburg, Sweden – 19-20 June, 2019

The CFP is also available in PDF format.

Important Dates:

  • Paper Submission Deadline:  18 February 2019, 23:59:59 UTC,
    22 February 2019, 23:59:59 EST
  • Notification to Authors: 12 April 2019
  • Final Paper Submission Deadline: 22 April 2019
  • Conference: 19-20 June 2019

General Information

The annual DIMVA conference serves as a premier forum for advancing the state of the art in the broader areas of intrusion detection, malware analysis, and vulnerability assessment. Each year, DIMVA brings together international experts from academia, industry, and government to present and discuss novel research in these areas. DIMVA is organized by the special interest group Security – Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI). The conference proceedings will appear in Springer Lecture Notes in Computer Science (LNCS) series.

Types of Solicited Submissions:

DIMVA solicits submissions of high-quality, original scientific papers presenting novel research on malware analysis, intrusion detection, vulnerability assessment, and related systems security topics. We invite submissions of two types:

FULL PAPERS, presenting novel and mature research results. Full papers are limited to 20 pages in Springer LNCS format, including bibliography and appendices.

SHORT PAPERS, presenting original, still ongoing work that has not yet reached the maturity required for a full paper. Short papers are limited to 10 pages in LNCS format, including bibliography and appendices. Short papers will be included in the proceedings. The title of short papers must start with the words “Extended Abstract”.

Papers that do not follow the above formatting guidelines may be rejected without review.

Indicative topics of interest include (but are not limited to):


  • Novel approaches and domains
  • Insider detection
  • Prevention and response
  • Data leakage, exfiltration, and poisoning
  • Result correlation and cooperation
  • Evasion and other attacks
  • Potentials and limitation
  • Operational experiences
  • Privacy, legal, and social aspects
  • Targeted attacks


  • Automated analyses
  • Behavioral models
  • Prevention and containment
  • Classification
  • Lineage
  • Forensics and recovery
  • Underground economy
  • Vulnerabilities in malware

Vulnerability detection

  • Vulnerability prevention
  • Vulnerability analysis
  • Exploitation and defenses
  • Hardware vulnerabilities
  • Situational awareness
  • Active probing

Papers will be judged on novelty, significance, correctness, and clarity. We expect all papers to provide enough detail to enable reproducibility of the experimental results. We encourage papers that bridge research in different communities. We also welcome experience papers that clearly articulate lessons learnt.

Submission Guidelines

DIMVA 2019 will adopt a double-blind reviewing process. All submissions should be appropriately anonymized. Author names and affiliations must be excluded from the paper. Furthermore, authors should avoid obvious self-references, and should cite their own previous work in third person, whenever necessary. Papers that are not properly anonymized risk being rejected without review.

Submissions must be original work and may not be under submission to another venue at the time of review. At least one author of each accepted paper is required to physically present the submitted work at the conference, for the paper to be included in the proceedings.

Papers can be submitted using the following submission website:

Ethical Considerations:

Submissions that report experiments with data gathered from human subjects should disclose whether the research received approval from an institutional ethics review boards (IRB), if applicable, and what measures were adopted to minimize risks to privacy.

Submissions that describe experiments related to vulnerabilities in software or systems should discuss the steps taken to avoid negatively affecting any third-parties (e.g., in case of probing of network devices), and how the authors plan to responsibly disclose the vulnerabilities to the appropriate software or system vendors or owners before publication.

If you have any questions, please contact the program chairs at

Sponsorship Opportunities:

We solicit interested organizations to serve as sponsors for DIMVA 2019. Please contact the sponsor chair ( for details regarding sponsorship.