posted by user: xiaonanguo || 150 views || tracked by 1 users: [display]

WiSec 2025 : 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks

FacebookTwitterLinkedInGoogle

Link: https://wisec2025.gmu.edu/
 
When Jun 30, 2025 - Jul 3, 2025
Where Arlington, Virginia, USA
Submission Deadline Nov 21, 2024
Notification Due Jan 15, 2025
Final Version Due Feb 5, 2025
 

Call For Papers

The 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2025) will be held in person from June 30 to July 3, 2025, in Arlington, Virginia, USA.

ACM WiSec is the leading ACM and SIGSAC conference dedicated to all aspects of security and privacy in wireless and mobile networks and their applications. In addition to the traditional ACM WiSec topics of physical, link, and network layer security, we welcome papers focusing on the increasingly diverse range of mobile or wireless applications such as the Internet of Things, Cyber-Physical Systems, as well as the security and privacy of mobile software platforms, usable security and privacy, biometrics, and cryptography.

Topics of interest for WiSec include the following, concerning systems in the second list below:

Confidentiality, integrity, availability
Authentication, identity, authorization, access control models and policies, localization, key management (agreement or distribution),
Privacy of systems, devices, users, their locations and other attributes
Exploitation of systems, including through reverse engineering, fuzzing, hardware or software vulnerabilities, protocol vulnerabilities, side channels, fault injection, resource exhaustion, jamming, or other means.
Abuse of and through systems, including messaging abuse (spam, robocalls, etc.), theft of service, and fraud
Defenses for exploitation and abuse
Experiences developing, testing, and deploying production-ready or large-scale secure wireless systems
Formal analysis, formal verification, and proof-based security approaches
Information theoretical approaches for security
Usable security and privacy, human factors
Application of Machine Learning, e.g., for attack detection or privacy violations
Economic and social impacts to security and privacy
Wireless and Mobile Systems of Interest include:

Wireless networking protocols, for example: 802.11, Bluetooth, 802.15.4-based protocols, cellular air protocols including LTE and 5G-NR, Vehicle and industrial device protocols (e.g., LoRA), wireless for critical infrastructure (e.g., ADS-B, GPS, rail, satellites), NFC and smart payment applications Cryptographic primitives and protocols for wireless and mobile systems, including: WPA2, AKA, etc.
Wireless physical layer technologies: transmission, reception, modulation, localization, remote sensing (e.g., radar, mmWave sensing), jammers, dynamic spectrum reuse and cognitive radio systems
Wireless and mobile device hardware and software, for example: embedded devices, wearables (e.g., watches), smartphones, mobile sensors, home and industrial automation devices (e.g., IoT, Smart Home, utilities, etc.), healthcare devices, vehicles (e.g., drones, automotive, avionics, satelites), and payment systems
Wireless and mobile adjacent topics, including voice interfaces, visible light communications, sonic, underwater communications, legacy telecommunications, …
The proceedings of ACM WiSec, sponsored by SIGSAC, will be published by ACM.

Important dates
Please note: WiSec will have two rounds of submissions. In previous years, WiSec has had a tradition of announcing deadline extensions. Due to the change in the submission process, there will not be time for extensions this year and all deadlines are firm.

First Cycle deadline
Submission: Nov 21, 2024
Author Notification: Jan 15, 2025
Camera-ready: Feb 05, 2025
Second Cycle deadline
Submission: Mar 12, 2025
Author Notification: Apr 23, 2025
Camera-ready: May 12, 2025
Posters/Demo
Submission: Early May 2025
Notifications: Mid-May 2025
Camera-Ready: Late May 2025
WiSec conference: June 30 - July 3, 2025
Submission Guidelines
All papers for ACM WiSec 2025 must be submitted electronically through the HotCRP conference management system.

Only PDF files will be accepted. Submissions must be prepared using the following ACM proceedings template and must use US Letter page size (215.9 x 279.4 mm / 8.5 x 11 inches):

The ACM proceedings template for LaTeX can be found at Association for Computing Machinery (ACM) - SIG Proceedings Template.
Please look at ACM Primary Article Template for further information on ACM proceedings templates.
Full, short, and SoK papers
Full paper submissions to ACM WiSec 2025 can be up to 10 pages in the ACM conference style excluding the bibliography and well-marked appendices, and up to 12 pages in total. ACM WiSec also encourages the submission of short papers with a length of up to 6 pages (including bibliography and appendices), which describe mature work of a more succinct nature. All papers must be thoroughly anonymized for double-blind reviewing.

Detailed submission instructions will be made available as the deadline approaches.

In addition to regular papers that present novel contributions in the field, we solicit Systematization of Knowledge (SoK) papers that evaluate, systematize, and contextualize existing knowledge on any of the above topics. Suitable papers provide an important new viewpoint on an established research area, support or challenge long-held beliefs with compelling evidence, present a convincing new taxonomy of such an area, and/or identify research gaps with evidence and a structured approach. Survey papers without such contributions are not suitable. SoK submissions will be distinguished by the prefix “SoK:” in the title and a checkbox on the submission form. They can be up to 10 pages in the ACM conference style excluding the bibliography and well-marked appendices, and up to 15 pages overall. They will be reviewed by the program committee and held to the same standards as regular research papers, except instead of emphasizing novel research contributions the emphasis will be on value to the community. Accepted papers will be presented at the symposium and included in the proceedings.

Posters and demos
WiSec will solicit submission of posters and demos. The instructions to submit posters/demos will be made available on the WiSec 2025 website.

Artifact Evaluation label
In the spirit of open science, WiSec encourages authors of accepted papers to make software and data artifacts publicly available to the community.

Such artifacts will be evaluated by the artifact evaluation committee and corresponding papers will be granted an artifact evaluation label. While artifacts are optional, their availability will be positively considered during paper evaluation. Should the authors choose to submit their artifacts for evaluation, they should indicate their decision upon paper submission and follow the artifact submission guidelines in order to submit them upon paper acceptance. The detailed guidelines will be made available on the WiSec 2025 website.

Double submissions
It is a policy of the ACM to disallow double/simultaneous submissions, where the same (or substantially similar) paper is concurrently submitted to multiple conferences/journals. Any double submissions detected will be immediately rejected from all conferences/journals involved. Technical reports and pre-prints published online are allowed.

Workshops and Tutorial
ACM WiSec will host workshops/tutorials co-organized with the main conference. Details will be made available on the website.

Related Resources

IEEE ICC'25 NextG-WiSec 2025   The 11th IEEE Workshop on NextG (6G and beyond) Wireless Security in conjunction with IEEE ICC 2025
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
MoWiN 2025   14th International Conference on Mobile & Wireless Networks
WoWMoM 2025   World of Wireless, Mobile and Multimedia Networks
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
CSF 2025   38th IEEE Computer Security Foundations Symposium - deadline 3
ICISPP--Ei 2025   2025 6th International Conference on Information Security and Privacy Protection (ICISPP 2025)
ICONS 2025   The Twentieth International Conference on Systems
Applied Sciences (MDPI) SI:Cybersecurity 2024   Applied Sciences (MDPI) Special Issue - Cybersecurity: Advances in Security and Privacy Enhancing Technology