[prev in list] [next in list] [prev in thread] [next in thread]
List: pen-test
Subject: CfP DIMVA 2010 - Detection of Intrusions and Malware & Vulnerability
From: Sebastian Schmerl <sbs () informatik ! tu-cottbus ! de>
Date: 2009-11-23 12:18:16
Message-ID: 4B0A7D88.5060902 () informatik ! tu-cottbus ! de
[Download RAW message or body]
Hello List-Member,
attached you'll find the Call for Paper for the International Conference
on Detection of Intrusions and Malware & Vulnerability Assessment. The
focus of the conference DIMVA covers topics on this list, so do not
hesitate to submit your research results as a paper or your ongoing work
as an extended abstract.
best regards,
Sebastian Schmerl (publicity-chair@dimva.org)
(We apologize if you receive multiple copies of this message.)
----------------------------------------------------------------------
CALL FOR PAPERS
DIMVA 2010
Seventh International Conference on
Detection of Intrusions and Malware & Vulnerability Assessment
Organized by GI SIG SIDAR
In Cooperation with
IEEE Computer Society Task Force on Information Assurance
Bonn, Germany
July 8-9 2010
http://www.dimva.org/dimva2010
info@dimva.org
----------------------------------------------------------------------
The annual DIMVA conference serves as a premier forum for advancing
the state of the art in intrusion detection, malware detection, and
vulnerability assessment. Each year DIMVA brings together
international experts from academia, industry and government to
present and discuss novel research in these areas. DIMVA is organized
by the special interest group Security - Intrusion Detection and
Response (SIDAR) of the German Informatics Society (GI). The
conference proceedings will appear in Springer's Lecture Notes in
Computer Science (LNCS) series.
DIMVA solicits submission of high-quality, original scientific work.
This year we invite two types of paper submissions:
* Full papers, presenting novel and mature research results. Full
papers are limited to 20 pages, prepared according to the
instructions provided below. They will be reviewed by the program
committee, and papers accepted for presentation at the conference
will be included in the proceedings.
* Short papers (extended abstracts), presenting original, still
ongoing work that has not yet reached the maturity required for a
full paper. Short papers are limited to 10 pages, prepared according
to the instructions provided below. They will also be reviewed by
the program committee, and papers accepted for presentation at the
conference will be included in the proceedings (containing Extended
Abstract in the title).
DIMVA's scope includes, but is not restricted to the following areas:
* Intrusion Detection
+ Novel approaches & new environments
+ Insider detection
+ Prevention & response
+ Data leakage
+ Result correlation & cooperation
+ Evasion attacks
+ Potentials & limitations
+ Operational experiences
+ Privacy, legal & social aspects
* Malware Detection
+ Automated analysis, reversing & execution tracing
+ Containment & sandboxed operation
+ Acquisition of specimen
+ Infiltration
+ Behavioral models
+ Prevention & containment
+ Trends & upcoming risks
+ Forensics & recovery
+ Economic aspects
* Vulnerability Assessment
+ Vulnerability detection & analysis
+ Vulnerability prevention
+ Web application security
+ Fuzzing techniques
+ Classification & evaluation
+ Situational awareness
Organizing Committee
General Chair: Marko Jahnke, Fraunhofer FKIE, Wachtberg,
Germany (info@dimva.org)
Program Chair: Christian Kreibich, International Computer
Science Institute, Berkeley, USA
(pc-chair@dimva.org)
Local Chair: Jens Toelle, Fraunhofer FKIE, Wachtberg,
Germany (info@dimva.org)
Rump Session Chair: Sven Dietrich, Stevens Institute of Technology,
USA (rump-chair@dimva.org)
Sponsorship Chair: Felix Leder, University of Bonn, Germany
(sponsor-chair@dimva.org)
Publicity Chair: Sebastian Schmerl, Technical University of
Cottbus, Germany (publicity-chair@dimva.org)
Program Committee
* Michael Bailey, University of Michigan, USA
* Herbert Bos, Vrije Universiteit Amsterdam, Netherlands
* Juan Caballero, CMU/UC Berkeley, USA
* Herve Debar, Telecom SudParis, France
* Sven Dietrich, Stevens Institute of Technology, USA
* Holger Dreger, Siemens CERT, Germany
* Ulrich Flegel, SAP Research, Germany
* Carrie Gates, CA Labs, Canada
* Chris Grier, University of California, Berkeley, USA
* Guofei Gu, Texas A&M University, USA
* Thorsten Holz, Vienna University of Technology, Austria
* Piotr Kijewski, NASK/CERT Polska, Poland
* Engin Kirda, Eurecom, France
* Christopher Kruegel, University of California, Santa Barbara, USA
* Wenke Lee, Georgia Institute of Technology, USA.
* Corrado Leita, Symantec Research Labs, France
* Kirill Levchenko, University of California, San Diego, USA
* Pavel Laskov, University of Tuebingen, Germany
* Ludovic Me, Supelec, France
* Michael Meier, Technical University of Dortmund, Germany
* Tyler Moore, Harvard University, USA
* Lexi Pimenidis, iDev GmbH, Germany
* Moheeb Rajab, Google/Johns Hopkins University, USA
* Robin Sommer, ICSI/LBNL, USA
* Henry Stern, Cisco/Ironport, USA
* Diego Zamboni, IBM Research, Switzerland
Important Dates
Deadline for paper submission: February 5, 2010
Notification of acceptance/rejection: April 5, 2010
Final camera-ready copies due: April 26, 2010
Conference: July 8-9, 2010
Paper Submission
All papers must be submitted electronically in PDF format via the
conference Web site. Submissions must be formatted according to the
instructions provided by Springer Verlag. For instructions, see
http://www.springer.de/comp/lncs/authors.html .
Submitted papers must be in English and must not substantially
overlap work that has been published before, or that is
simultaneously in submission to a journal or a conference with
proceedings. Simultaneous submission, submission of previously
published work, and plagiarism constitute dishonesty or fraud. DIMVA
prohibits these practices and may take appropriate action against
authors who have committed them.
Authors of accepted papers must ensure that their papers will be pre-
ented at the conference. Presentations must also be held in English.
Details about the electronic submission procedure will be provided on
the conference Web site by the end of December 2009. Authors of ac-
cepted papers must follow the Springer guidelines for preparation of
camera-ready copies. Details of the process will be provided to the
authors in time.
Rump session
As in previous years, DIMVA 2010 will hold a Rump Session: a series
of short and entertaining talks where attendees can present recent
research results, work in progress, or other topics of interest to
the community. Please contact the Rump Session Chair for submission
questions.
Sponsorship Opportunities
We solicit interested organizations to serve as sponsors for DIMVA
2010; please contact the sponsorship chair for information regarding
corporate sponsorship.
Steering Committee
Chairs:
* Ulrich Flegel, SAP Research, Germany
* Michael Meier, Technical University of Dortmund, Germany
Members:
* Roland Bueschkes, RWE, Germany
* Danilo M. Bruschi, Universita degli Studi di Milano, Italy
* Herve Debar, Telecom SudParis, France
* Bernhard Haemmerli, Acris GmbH & HSLU Lucerne, Switzerland
* Marc Heuse, Baseline Security Consulting, Germany
* Klaus Julisch, IBM Zurich Research Lab, Switzerland
* Christopher Kruegel, UC Santa Barbara, USA
* Pavel Laskov, University of Tuebingen, Germany
* Robin Sommer, ICSI/LBNL, USA
* Diego Zamboni, IBM Zurich Research Lab, Switzerland
--
_____________________________________________________________________
Sebastian Schmerl Tel: +49 (0) 355 69 20 29
sbs@informatik.tu-cottbus.de Fax: +49 (0) 355 69 21 27
BTU Cottbus
Computer Networks and Communication System
P.O.Box 10 13 44, 03013 Cottbus, Germany
http://www-rnks.informatik.tu-cottbus.de
_____________________________________________________________________
------------------------------------------------------------------------
This list is sponsored by: Information Assurance Certification Review Board
Prove to peers and potential employers without a doubt that you can actually do a \
proper penetration test. IACRB CPT and CEPT certs require a full practical \
examination in order to become certified.
http://www.iacertification.org
------------------------------------------------------------------------
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic