Join our Discord server
Follow us on Mastodon
Follow us on X/Twitter
Follow us on Bluesky

Conference Program

Sponsors




Call for Papers

Important Dates (AoE)

  • Cycle 1:
  • Cycle 2:
  • Camera ready deadline: 28 May 2026
  • Conference: 1-3 July 2026

Conference Registration

To be included in the proceedings, every accepted paper requires a general (no student) registration and in-person presentation. Registration payment must be completed before the camera-ready deadline. Registration will open around mid April.

General Information

The annual DIMVA conference serves as a premier forum for advancing the state of the art in the broader areas of intrusion detection, malware analysis, and vulnerability assessment. Each year, DIMVA brings together international experts from academia, industry, and government to present and discuss novel research in these areas. DIMVA is organized by the special interest group Security – Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI). The conference proceedings will appear in the Springer Lecture Notes in Computer Science (LNCS) series.

Topics of Interest

DIMVA solicits submissions of high-quality, original scientific papers presenting novel research on malware analysis, intrusion detection, vulnerability assessment, and related systems security topics.

Topics of interest include, but are not limited to:

Intrusions

  • Novel approaches and domains
  • Insider detection
  • Prevention and response
  • Data leakage, exfiltration, and poisoning
  • Result correlation and cooperation
  • Evasion and other attacks
  • Potentials and limitation
  • Operational experiences
  • Privacy, legal, and social aspects
  • Targeted attacks
  • Analysis or detection of cryptocurrency heists

Malware

  • Automated analyses
  • Behavioral models
  • Prevention and containment
  • Classification
  • Lineage
  • Forensics and recovery
  • Underground economy
  • Vulnerabilities in malware
  • Financially targeted malware (e.g., ransomware, DeFi)

Vulnerability detection

  • Vulnerability prevention
  • Vulnerability analysis
  • Exploitation and defenses
  • Hardware vulnerabilities
  • Situational awareness
  • Active probing
  • Vulnerabilities in decentralized systems

Papers will be judged on novelty, significance, correctness, and clarity. We expect all papers to provide enough details to enable reproducibility of the experimental results. We encourage papers that bridge research in different communities. We also welcome experience papers that clearly articulate lessons learnt.

Types of Submissions Solicited

DIMVA solicits full papers presenting novel and mature research results. Full papers are limited to 25 pages in Springer LNCS format, including 18 pages of content, 5 pages of bibliography and 2 pages of appendices.

Papers that do not follow the above formatting guidelines may be rejected without review. Authors are not allowed to resubmit rejected Cycle 1 papers to Cycle 2.

Submission Guidelines

DIMVA 2026 will adopt a double-blind reviewing process. All submissions should be appropriately anonymized. Author names and affiliations must be excluded from the paper. Furthermore, authors should avoid obvious self-references, and should cite their own previous work in third person, whenever necessary. Papers that are not properly anonymized risk being rejected without review.

Submissions must be original work and may not be under submission to another venue at the time of review. At least one author of each accepted paper is required to physically present the submitted work at the conference, for the paper to be included in the proceedings.

Authors are encouraged to submit artifacts (e.g., code, datasets) appropriately anonymized, using, e.g., https://anonymous.4open.science/.

Use of Generative AI

The role of AI in research is rapidly evolving, and our community must approach its use with clarity and integrity. Authors may employ generative AI tools (e.g., LLMs) as part of a defined research methodology, to improve the presentation of their manuscript, and to produce artifacts that the authors subsequently verify for correctness. However, it is not acceptable to delegate the creation of research content or the writing of the paper to generative AI tools, nor to present artifacts or analyses generated by such tools without independent verification. In cases not explicitly covered above, authors must disclose the use of generative AI tools at the time of submission, with a level of detail proportional to the extent of text or content generated.

Ethical considerations

Research can potentially lead to adverse outcomes. Individuals or organizations may experience negative consequences during the research process, immediately following publication, or in the future. Authors must proactively anticipate and address potential negative consequences of both conducting and publishing their research. Submissions may be rejected regardless of scientific merit if they fail to adequately address ethical concerns. If a paper relates to human subjects, analyzes data derived from human subjects, may put humans at risk, or might have other ethical implications, authors should disclose if an ethics review (e.g., IRB approval) was conducted, and discuss in the paper how ethical and legal concerns were addressed. IRB exemptions may not be sufficient grounds for proper mitigation of ethical concerns. If the paper reports a potentially high-impact vulnerability, the authors should report or at least discuss their plan for responsible disclosure. The chairs will contact the authors in case of concerns.

If you have any questions, please contact the program chairs at pc-chairs@dimva.org.



Call for Posters

Important Dates (AoE)

  • Submission: up to TBA
  • Notification: TBA
  • Camera-ready: TBA
High-quality posters facilitate discussions about recent research findings, encourage meaningful interactions with interested attendees, showcase ongoing projects, and present innovative ideas. DIMVA invites submissions of posters that highlight preliminary results, ongoing work, or recently published research. Posters will be displayed in a forum setting, allowing attendees to mingle and engage with the presenters.

Submission Guidelines

Poster submissions must include two components: the poster draft and an accompanying poster paper. The poster paper should be at least 4 pages, but no more than 6 pages long, formatted according to the Springer LNCS guidelines, and this page count includes the bibliography and any appendices. Proposals are not anonymized and must clearly state the authors' names, affiliations, and contact information. The poster papers will be published in the proceedings. Please ensure that the title of the poster paper begins with the word "Poster".
Poster submission system: TBA
Note: Poster sessions will be held in-person. At least one author of each accepted poster will be required to attend the conference. During the conference, we will provide poster stands. Attendees may bring printed posters up to size A1.


Committee

Program chairs (email: pc-chairs@dimva.org)

Program committee

    TBA

Publication chair

  • Michele Carminati (Politecnico di Milano)

Poster co-chairs

  • Tarini Saka (Ruhr University Bochum)
  • Mateo Marini (Sapienza University of Rome)

General chairs

  • Chair Sotiris Ioannidis (Technical University of Crete)
  • Co-chair Michalis Diamantaris (Technical University of Crete)

Publicity chair

  • Konstantinos Spyridakis (Technical University of Crete)

Steering committee

  • Sven Dietrich (co-chair)
  • Ulrich Flegel (co-chair)
  • Michael Meier (co-chair)
  • Michele Caminati
  • Lorenzo Cavallaro
  • Manuel Egele
  • Mathias Fischer
  • Giorgio Giacinto
  • Daniel Gruss
  • Federico Maggi
  • Mathias Payer


Venue: Grand Arsenal (Center of Mediterranean Architecture)

Front view of

History

The Grand Arsenal is the last of the 17 Neoria to the west. Its construction started in 1585 by the Intendant Alvise Grimani. A new era began for the Grand Arsenal with the addition of the second floor, in 1872, during the Ottoman era. The building hosted several important public services and authorities. From a roofless, abandoned site, today the building has given a second chance to life by being converted into a remarkable multipurpose space for events and expositions. After its restoration in 2002, it is now the Center of Mediterranean Architecture, hosting important cultural events, scientific and political symposiums, artistic exhibitions, international venues with special emphasis on architecture.

Address: Akti Enoseos & Georgios Katechakis Square (View Location on Google Maps)


Travel Information

By Plane

Chania Airport (CHQ) – Ioannis Daskalogiannis

BUS (KTEL)

The most inexpensive way to leave the airport of Chania is by taking a KTEL bus. Fare 2-3 EUR, The station is located outside the building, and you may purchase your tickets beforehand or directly from the bus driver. Bus final destination is the central bus station of Chania. Then you can walk to the venue (approximately 15 minutes, 1.1km) or take a taxi.

  • Fare: EUR 2-3
  • Duration: 20 minutes
  • Walk: 10 minutes from the central bus station to the venue
  • Frequency: Every 30 minutes
TAXI

Otherwise, the simplest way to get to Chania center is to take a taxi from Chania International Airport (CHQ), Ioannis Daskalogiannis. The fare for reaching the Chania center is approximately EUR 27 and the journey takes around 25 minutes.

Tip: Taxi stands are always available. However, if you prefer to leave the premises immediately, you may book a transfer service in advance. You can also arrange a pick-up with local drivers.

Content Responsibility and Admin

Sotiris Ioannidis
Technical University of Crete
Akrotiri Campus
731 00 Chania, Greece
Telephone: +30 28210 37344
E-Mail: sioannidis@tuc.gr

Privacy Policy

Processing of your personal data when you visit this website

When visiting this website, we do not store any personal data. Your IP address is processed solely to the extent required for the technical delivery of the web content. Depending on your browser configuration, additional information such as browser type, version, operating system, and referrer URL may also be transmitted. This data is used exclusively to ensure the proper and optimized presentation of the website. No further processing of personal data is carried out, and all transmitted data is deleted immediately after use.

Cookies

This website does not use cookies.

Server log files

This website does not save temporary logs.

External resources

All pictures, fonts, and additional resources are retrieved solely from our server, so that your visit to our website does not leave any traces at third parties.