HOME

TheInfoList



OR:

The Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) event is an annual
conference A conference is a meeting of two or more experts to discuss and exchange opinions or new information about a particular topic. Conferences can be used as a form of group decision-making, although discussion, not always decisions, are the main p ...
designed to serve as a general forum for discussing
malware Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, depri ...
and the vulnerability of computing systems to attacks, advancing
computer security Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, the ...
through the exchange of ideas. It is one of the projects of the
German Informatics Society The German Informatics Society (GI) (german: Gesellschaft für Informatik) is a German professional society for computer science, with around 20,000 personal and 250 corporate members. It is the biggest organized representation of its kind in the ...
(GI). According to the official DIMVA website on its 2017 event, "Each year, DIMVA brings together international experts from academia, industry, and government to present and discuss novel research in these areas." Said conference was held from 6 July to 7 July in the city of
Bonn The federal city of Bonn ( lat, Bonna) is a city on the banks of the Rhine in the German state of North Rhine-Westphalia, with a population of over 300,000. About south-southeast of Cologne, Bonn is in the southernmost part of the Rhine-Ruhr r ...
,
Germany Germany,, officially the Federal Republic of Germany, is a country in Central Europe. It is the second most populous country in Europe after Russia, and the most populous member state of the European Union. Germany is situated betwe ...
. It was sponsored by entities such as
Google Google LLC () is an American multinational technology company focusing on search engine technology, online advertising, cloud computing, computer software, quantum computing, e-commerce, artificial intelligence, and consumer electronics. ...
,
Rohde & Schwarz Rohde & Schwarz GmbH & Co KG (, ) is an international electronics group specializing in the fields of electronic test equipment, broadcast & media, cybersecurity, radiomonitoring and radiolocation, and radiocommunication. The company provides ...
, and VMRay. A conference report that demonstrated how to externally manipulate an
Alfa Romeo Alfa Romeo Automobiles S.p.A. () is an Italian luxury car manufacturer and a subsidiary of Stellantis. The company was founded on 24 June 1910, in Milan, Italy. "Alfa" is an acronym of its founding name, "Anonima Lombarda Fabbrica Automobili." ...
Giulietta's networked safety systems and essentially
hack Hack may refer to: Arts, entertainment, and media Games * ''Hack'' (Unix video game), a 1984 roguelike video game * ''.hack'' (video game series), a series of video games by the multimedia franchise ''.hack'' Music * ''Hack'' (album), a 199 ...
into the vehicle attracted notice from publications such as Fiat Chrysler Authority.


See also

*
German Informatics Society The German Informatics Society (GI) (german: Gesellschaft für Informatik) is a German professional society for computer science, with around 20,000 personal and 250 corporate members. It is the biggest organized representation of its kind in the ...
*
Malware Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, depri ...
**
Malware analysis Malware analysis is the study or process of determining the functionality, origin and potential impact of a given malware sample such as a virus, worm, trojan horse, rootkit, or backdoor. Malware or malicious software is any computer software intend ...
*
Vulnerability (computing) Vulnerabilities are flaws in a computer system that weaken the overall security of the device/system. Vulnerabilities can be weaknesses in either the hardware itself, or the software that runs on the hardware. Vulnerabilities can be exploited by ...
*
Security engineering Security engineering is the process of incorporating security controls into an information system so that the controls become an integral part of the system’s operational capabilities. It is similar to other systems engineering activities in tha ...


References

Computer security organizations {{compu-conference-stub