posted by user: claudiagreco || 96 views || tracked by 1 users: [display]

MIST 2025 : Workshop on Mobile and IoT Security Technologies at ESORICS 2025

FacebookTwitterLinkedInGoogle

Link: https://mist-workshop.github.io/
 
When Sep 22, 2025 - Sep 26, 2025
Where Toulouse, France
Submission Deadline Jun 30, 2025
Notification Due Aug 10, 2025
Final Version Due Aug 25, 2025
Categories    security   privacy   IOT   mobile
 

Call For Papers

CO-LOCATED WITH ESORICS 2025

The rapid proliferation of Internet of Things (IoT) devices and mobile technologies has radically reshaped modern computing, introducing both significant opportunities and critical security challenges. IoT systems are now deeply embedded in smart homes, industrial control systems, healthcare, and critical infrastructure, making them attractive targets for cyberattacks that exploit insecure communication protocols, firmware vulnerabilities, and misconfigured devices. At the same time, mobile devices, powered by platforms such as Android and iOS, have become central to personal and enterprise security, handling sensitive data, authentication, and financial transactions. As these devices increasingly serve as gateways to digital identities and critical services, securing apps, payment systems, authentication mechanisms, and enterprise mobile management solutions has become a pressing concern.
The MIST workshop will explore the latest advancements in IoT and mobile security, focusing on the peculiar vulnerabilities and threats these systems face. Additionally, it will address how generative AI and Large Language Models (LLMs) are influencing this space. These emerging technologies have the potential to enhance security by automating threat detection, vulnerability analysis, and response strategies. However, they also introduce new challenges, as they can be leveraged by attackers to craft sophisticated cyberattacks, bypass existing defenses, and exploit IoT and mobile system vulnerabilities.
The goal of the MIST workshop is to bring together researchers and practitioners to discuss the evolving security landscape of IoT and mobile systems. The workshop welcomes contributions on a broad range of topics related to securing these technologies, including novel attack vectors, defense mechanisms, risk assessments, and real-world case studies. In particular, we encourage discussions on the impact of generative AI and LLMs, both as tools for strengthening cybersecurity and as potential enablers of new attack strategies. This discussion will highlight the complexities and opportunities of integrating AI-driven solutions into security frameworks, with a particular focus on the implications these technologies have for the future of IoT and mobile system protection.
We invite submissions of original research papers on topics related to IoT and mobile security. Possible topics include, but are not limited to:

- Malware for IoT or mobile devices
- GenAI and LLMs for IoT and mobile security
- Supply-chain attacks
- IoT security and privacy
- IoT software similarity analysis
- Android and iOS security and privacy
- Adversarial learning for IoT and mobile security
- Intrusion detection and prevention for IoT
- Mobile application security and digital forensics
- IoT Hardware security
- Cyber physical systems security
- Cryptography for IoT and mobile
- Mobile user authentication and authorization

* Submission details

All accepted papers will be published in the Springer LNCS series.

Submitted papers must not substantially overlap with previously published or currently under review papers for journals or conferences. The only accepted format for submission is pdf. Submitted papers must follow the LNCS template from the time they are submitted. Submitted papers should be at most 16 pages (using 10-point font), excluding the bibliography and well-marked appendices, and at most 20 pages total. Committee members are not required to read the appendices, so the paper should be intelligible without them. All submissions must be written in English.
Failure to comply with these guidelines may lead to rejection without considering the content’s quality. If accepted, authors must agree to the Springer LNCS copyright and present their papers at the workshop.

Submission site: https://easychair.org/conferences/?conf=esorics2025

Related Resources

SECURWARE 2025   The Nineteenth International Conference on Emerging Security Information, Systems and Technologies
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
SENSORCOMM 2025   The Nineteenth International Conference on Sensor Technologies and Applications
ASUC 2025   16th International Conference on Ad hoc, Sensor & Ubiquitous Computing
ESORICS 2025   European Symposium on Research in Computer Security (round 2)
ICMU 2025   The 15th International Conference on Mobile Computing and Ubiquitous Networking
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
CoUDP 2025   2025 International Conference on Urban Design and Planning (CoUDP 2025)
UBICOMM 2025   The Nineteenth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
DSA 2025   The 12th International Conference on Dependability Systems and Their Applications