logo

June 30 - July 03, 2025

Rank: B (CORE2023)Offline

ACM Conference on Security and Privacy in Wireless and Mobile Networks

Updated: 4 days ago
0.0 (0 Ratings)

No followers yet.

Overview

The 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2025) will take place from June 30 to July 3, 2025, in Arlington, Virginia, USA, hosted by George Mason University. ACM WiSec is a premier conference focused on security and privacy in wireless and mobile networks, IoT, cyber-physical systems, and related areas, attracting researchers, students, and industry professionals.

Call for papers

Call for Papers: ACM WiSec 2025

The 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2025) will be held in person from June 30 to July 3, 2025, in Arlington, Virginia, USA.

About ACM WiSec

ACM WiSec is the leading ACM and SIGSAC conference dedicated to all aspects of security and privacy in wireless and mobile networks and their applications, mobile software platforms, the Internet of Things, cyber-physical systems, usable security and privacy, biometrics, and cryptography. It is a competitive, high-quality conference well-attended by industry, government, and academia.

Topics of Interest

Topics of interest for WiSec include:

  • Confidentiality, integrity, availability
  • Authentication, identity, authorization, access control models and policies, localization, key management (agreement or distribution)
  • Privacy of systems, devices, users, their locations and other attributes
  • Exploitation of systems, including through reverse engineering, fuzzing, hardware or software vulnerabilities, protocol vulnerabilities, side channels, fault injection, resource exhaustion, jamming, or other means.
  • Abuse of and through systems, including messaging abuse (spam, robocalls, etc.), theft of service, and fraud
  • Defenses for exploitation and abuse
  • Experiences developing, testing, and deploying production-ready or large-scale secure wireless systems
  • Formal analysis, formal verification, and proof-based security approaches
  • Information theoretical approaches for security
  • Usable security and privacy, human factors
  • Application of Machine Learning, e.g., for attack detection or privacy violations
  • Economic and social impacts to security and privacy

Wireless and Mobile Systems of Interest

  • Wireless networking protocols, for example: 802.11, Bluetooth, 802.15.4-based protocols, cellular air protocols including LTE and 5G-NR, Vehicle and industrial device protocols (e.g., LoRA), wireless for critical infrastructure (e.g., ADS-B, GPS, rail, satellites), NFC and smart payment applications
  • Cryptographic primitives and protocols for wireless and mobile systems, including: WPA2, AKA, etc.
  • Wireless physical layer technologies: transmission, reception, modulation, localization, remote sensing (e.g., radar, mmWave sensing), jammers, dynamic spectrum reuse and cognitive radio systems
  • Wireless and mobile device hardware and software, for example: embedded devices, wearables (e.g., watches), smartphones, mobile sensors, home and industrial automation devices (e.g., IoT, Smart Home, utilities, etc.), healthcare devices, vehicles (e.g., drones, automotive, avionics, satellites), and payment systems
  • Wireless and mobile adjacent topics, including voice interfaces, visible light communications, sonic, underwater communications, legacy telecommunications, …

Important Dates

  • First Cycle Deadlines:
    • Submission: November 21, 2024
    • Author Notification: January 15, 2025
    • Camera-ready: February 5, 2025
  • Second Cycle Deadlines:
    • Submission: March 16, 2025 (AOE)
    • Author Notification: April 25, 2025
    • Camera-ready: May 12, 2025
  • Posters/Demo Deadlines:
    • Submission: April 30, 2025 (AOE)
    • Author Notification: May 8, 2025
    • Camera-ready: May 12, 2025

Note: All deadlines are firm.

Submission Guidelines

Full, Short, and SoK Papers

  • Full papers: At most 10 pages (excluding bibliography and appendices), up to 12 pages total.
  • Short papers: Up to 6 pages (including bibliography and appendices).
  • SoK papers: Up to 10 pages (excluding bibliography and appendices), up to 15 pages total. Title must be prefixed with "SoK:".
  • All papers must be anonymized for double-blind review.

Posters and Demos

Instructions for poster and demo submissions will be made available on the WiSec 2025 website.

Artifact Evaluation

WiSec encourages authors to make software and data artifacts publicly available. Artifacts will be evaluated, and corresponding papers may be granted an artifact evaluation label.

Double Submissions

Double/simultaneous submissions to other conferences/journals are not allowed and will result in immediate rejection.

Registration

  • Registration is now open.
  • Authors of accepted papers must register by May 12, 2025.
  • Early bird rates are available until May 19, 2025.

Travel Grants for Students

ACM WiSec 2025 offers a limited number of travel grants for students who have registered and co-authored an accepted paper. Grants are competitive and intended to reimburse travel expenses.

  • Maximum of two students per institution.
  • Not eligible for postdoctoral researchers, faculty members, or senior research personnel.
  • Grant recipients may receive up to $1,000 for documented expenses (registration, airfare, lodging).
  • To apply, please complete and submit the travel grant form (Note: Link is illustrative).

Research Ethics

All submitted papers will be reviewed for ethical concerns. Researchers should consider ethical analysis an integral part of their research, adhering to principles of beneficence, justice, respect for persons, and respect of law and public interest. For human subjects research, authors are expected to follow relevant laws and institutional practices (e.g., IRB review in the US).

Policy for Peer-Review Integrity

All SIGSAC-sponsored conferences adhere to ACM policies against harassment and the ACM Code of Ethics. Authors, PC members, and reviewers must follow ACM Publications Policies, including upholding the integrity of the peer review process and avoiding conflicts of interest. Violations will be penalized according to ACM policies.

Important Dates

Conference Dates

Conference Date

June 30, 2025July 3, 2025

Submission

First Cycle deadlines Submission

November 21, 2024

Second Cycle deadlines Submission

March 16, 2025

Posters/Demo deadlines Submission

April 30, 2025

Notification

First Cycle deadlines Author Notification

January 15, 2025

Second Cycle deadlines Author Notification

April 25, 2025

Posters/Demo deadlines Author Notification

May 8, 2025

Camera-Ready

First Cycle deadlines Camera-ready

February 5, 2025

Posters/Demo deadlines Camera-ready

May 12, 2025

Second Cycle deadlines Camera-ready

May 12, 2025

Registration

Authors of accepted papers must register by

May 12, 2025

Early bird rates are available until

May 19, 2025

Source Rank

Source: CORE2023

Rank: B

Field of Research: Cybersecurity and privacy

Map

Loading feedback section...