IT security is an integral aspect in operating IT systems today. Yet, as even high-end precautionary measures cannot prevent every attack or security mishap, the capabilitiy to quickly respond to IT security incidents, to secure infrastructure operations and data, as well as forensic capabilities in investigating such incidents in both technical and legal aspects are paramount. Capable incident response and forensic procedures have thus gained essential relevance in IT infrastructure operations and in law-enforcement, and there is ample need for research and standardization in this area.
Since 2003, the IMF conference has established itself as one of the premier European venues for presenting research on IT security incident response and management and IT forensics. The conference provides a platform for experts from throughout the world to present and discuss recent technical and methodical advances in the field. It shall enable collaboration and exchange of ideas between industry (both as users and solution providers), academia, law-enforcement and other government bodies.
IMF's intent is to gather experts from throughout the world in order to present and discuss recent technical and methodical advances in the fields of IT security incident response and management and IT forensics. The conference provides a platform for collaboration and exchange of ideas between industry, academia, law-enforcement and other government bodies.
The scope of IMF 2015 is broad and includes, but is not limited to the following areas:
Besides the regular conference papers, IMF2015 also invites to contribute papers for the special sessions with research topics outlined below, presenting novel and mature results, new ideas and trends as well as practice papers, describing best practices, case studies or lessons learned.
As (individually crafted) malware plays an important role in attacks on productive IT environments in the Desktop IT domain, mobile systems, industrial environments, automotive control units and beyond, malware analysis is an increasingly important building block of IT forensic investigations. This special session addresses new directions and ideas in Malware Analysis and Forensics to support IT forensic investigations of respective security incidents. Examples of relevant topics are (not limited to):
In the context of this conference, digitized forensics addresses the traditional forensic disciplines (e.g. crime scene forensics, detection of counterfeits of physical objects and artwork) that utilize digital methods to acquire and analyze the physical traces digitally. This special session thematically complements the main conference towards novel digitized methods for the purpose of forensic challenges by bridging the gap between the emerging domains of IT and criminalistic forensics.
The scope of this special session ranges from digital processing of crime scene traces, such as fingerprints, palm prints, fibers, tool and ammunition marks or handwriting traces, to approaches for detecting and analyzing counterfeit physical objects and artworks, as well as the forensic analysis of media streams, e.g. for extracting and identifying characteristic origin patterns. Potential topics include, but are not limited to:
This special session addresses the topics of teaching forensics and intrusion management from both a national and an international perspective to identify common approaches and differences for an exchange on experience and knowledge gained. Potential topics include, but are not limited to:
IMF invites to submit full papers, presenting novel and mature research results, as well as practice papers, describing best practices, case studies or lessons learned. The maximum paper length for full papers is 20 pages, including the bibliography and well-marked appendices. Short papers for reporting early research results or best practice approaches are limited to 5 pages. Proposals for workshops, discussions and presentations on practical methods and challenges are also welcome.
Please submit your paper here.
You will find the submission guidelines here.
All submissions must be written in English language (see below) and submitted either in postscript or PDF format. Submissions must be anonymized. Authors of accepted papers must ensure that their papers will be presented at the conference. Submitted full papers must not substantially overlap papers that have been published elsewhere or that are simultaneously submitted to a journal or a conference with proceedings.
Additionally, IMF2015 hosts special sessions regarding selected topics from incident response and forensics.
All submissions, including the submissions for the special sessions, will be reviewed by the program committee and papers accepted for presentation at the conference will be included in the conference proceedings.
IMF 2015's scope is international. Hence all submissions must be written in English language. Presentations of accepted papers must be given in English language as well.
Accepted papers will be published by Conference Publishing Services and submitted to the IEEE Xplore Digital Library. Each participant of the conference will receive a printed copy.
December 15th, 2014: Deadline for paper registration
December 22nd, 2014: Deadline for uploading final version of paper
February 14th, 2015: Notification of acceptance or rejection
March 1st, 2015: Due date for conference registration for authors
March 1st, 2015: Due date for final camera-ready copies
Registration is now open until May 12th, 2015!
May 18th through 20th, 2015: IMF 2015 Conference
Jana Dittmann University of Magdeburg, Germany email@example.com
Silke Reifgerste University of Magdeburg, Germany firstname.lastname@example.org
Holger Morgenstern Albstadt-Sigmaringen University, Germany Jana Dittmann Otto von Guericke University, Magdeburg, Germany email@example.com
Andreas Schuster, BFK edv-consulting GmbH
Andreas Dewald, FAU Erlangen, Germany
Harald Baier, CASED
Jack Cole, ARL
Oliver Göbel, Universitaet Stuttgart, RUS-CERT
Jens Nedon, IABG
Detlef Günther, Volkswagen AG
Holger Morgenstern, Albstadt-Sigmaringen University
Martin Rieger, Albstadt-Sigmaringen University
Dirk Schadt, SPOT Consulting
Levente Buttyan, Budapest University of Technology and Economics
Marko Schuba, FH Aachen - Aachen University of Applied Sciences
Mark Schiller, Stratton Security Ltd.
Jana Dittmann, University of Magdeburg
Stefan Kiltz, University of Magdeburg
Robert Martin, MITRE
Kwok-Yan Lam, National University of Singapore
Sebastian Schinzel, Münster University of Applied Sciences
Bernd Grobauer, Siemens
Pavel Gladyshev, University College Dublin (UCD)
Stephen Wolthusen, Gjovik University College
Claus Vielhauer, University of Magdeburg, Brandenburg University of Applied Sciences
Tobias Hoppe, University of Magdeburg
Mario Hildebrandt, University of Magdeburg
Christian Krätzer, University of Magdeburg
Volker Krummel, Wincor Nixdorf, Germany
German Informatics Society (GI e.V.)
Wissenschaftszentrum Ahrstr. 45, 53175 Bonn, Germany Tel.: +49 228 302 145, Fax: +49 228 302 167
We invite interested organizations to serve as sponsors for IMF 2015; please contact the organization committee at (firstname.lastname@example.org).
Otto-von-Guericke Zentrum Schleinufer 1 39104 Magdeburg Germany