logo

30 juin - 03 juillet 2025

Classement: B (CORE2023)Offline

ACM Conference on Security and Privacy in Wireless and Mobile Networks

Mis à jour le : 2 days ago
0.0 (0 Évaluations)

Aucun abonné pour le moment.

Aperçu

The 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2025) will take place from June 30 to July 3, 2025, in Arlington, Virginia, USA, hosted by George Mason University. ACM WiSec is a premier conference focused on security and privacy in wireless and mobile networks, IoT, cyber-physical systems, and related areas, attracting researchers, students, and industry professionals.

Appel à communications

Call for Papers: ACM WiSec 2025

The 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2025) will be held in person from June 30 to July 3, 2025, in Arlington, Virginia, USA.

About ACM WiSec

ACM WiSec is the leading ACM and SIGSAC conference dedicated to all aspects of security and privacy in wireless and mobile networks and their applications, mobile software platforms, the Internet of Things, cyber-physical systems, usable security and privacy, biometrics, and cryptography. It is a competitive, high-quality conference well-attended by industry, government, and academia.

Topics of Interest

Topics of interest for WiSec include:

  • Confidentiality, integrity, availability
  • Authentication, identity, authorization, access control models and policies, localization, key management (agreement or distribution)
  • Privacy of systems, devices, users, their locations and other attributes
  • Exploitation of systems, including through reverse engineering, fuzzing, hardware or software vulnerabilities, protocol vulnerabilities, side channels, fault injection, resource exhaustion, jamming, or other means.
  • Abuse of and through systems, including messaging abuse (spam, robocalls, etc.), theft of service, and fraud
  • Defenses for exploitation and abuse
  • Experiences developing, testing, and deploying production-ready or large-scale secure wireless systems
  • Formal analysis, formal verification, and proof-based security approaches
  • Information theoretical approaches for security
  • Usable security and privacy, human factors
  • Application of Machine Learning, e.g., for attack detection or privacy violations
  • Economic and social impacts to security and privacy

Wireless and Mobile Systems of Interest

  • Wireless networking protocols, for example: 802.11, Bluetooth, 802.15.4-based protocols, cellular air protocols including LTE and 5G-NR, Vehicle and industrial device protocols (e.g., LoRA), wireless for critical infrastructure (e.g., ADS-B, GPS, rail, satellites), NFC and smart payment applications
  • Cryptographic primitives and protocols for wireless and mobile systems, including: WPA2, AKA, etc.
  • Wireless physical layer technologies: transmission, reception, modulation, localization, remote sensing (e.g., radar, mmWave sensing), jammers, dynamic spectrum reuse and cognitive radio systems
  • Wireless and mobile device hardware and software, for example: embedded devices, wearables (e.g., watches), smartphones, mobile sensors, home and industrial automation devices (e.g., IoT, Smart Home, utilities, etc.), healthcare devices, vehicles (e.g., drones, automotive, avionics, satellites), and payment systems
  • Wireless and mobile adjacent topics, including voice interfaces, visible light communications, sonic, underwater communications, legacy telecommunications, …

Important Dates

  • First Cycle Deadlines:
    • Submission: November 21, 2024
    • Author Notification: January 15, 2025
    • Camera-ready: February 5, 2025
  • Second Cycle Deadlines:
    • Submission: March 16, 2025 (AOE)
    • Author Notification: April 25, 2025
    • Camera-ready: May 12, 2025
  • Posters/Demo Deadlines:
    • Submission: April 30, 2025 (AOE)
    • Author Notification: May 8, 2025
    • Camera-ready: May 12, 2025

Note: All deadlines are firm.

Submission Guidelines

Full, Short, and SoK Papers

  • Full papers: At most 10 pages (excluding bibliography and appendices), up to 12 pages total.
  • Short papers: Up to 6 pages (including bibliography and appendices).
  • SoK papers: Up to 10 pages (excluding bibliography and appendices), up to 15 pages total. Title must be prefixed with "SoK:".
  • All papers must be anonymized for double-blind review.

Posters and Demos

Instructions for poster and demo submissions will be made available on the WiSec 2025 website.

Artifact Evaluation

WiSec encourages authors to make software and data artifacts publicly available. Artifacts will be evaluated, and corresponding papers may be granted an artifact evaluation label.

Double Submissions

Double/simultaneous submissions to other conferences/journals are not allowed and will result in immediate rejection.

Registration

  • Registration is now open.
  • Authors of accepted papers must register by May 12, 2025.
  • Early bird rates are available until May 19, 2025.

Travel Grants for Students

ACM WiSec 2025 offers a limited number of travel grants for students who have registered and co-authored an accepted paper. Grants are competitive and intended to reimburse travel expenses.

  • Maximum of two students per institution.
  • Not eligible for postdoctoral researchers, faculty members, or senior research personnel.
  • Grant recipients may receive up to $1,000 for documented expenses (registration, airfare, lodging).
  • To apply, please complete and submit the travel grant form (Note: Link is illustrative).

Research Ethics

All submitted papers will be reviewed for ethical concerns. Researchers should consider ethical analysis an integral part of their research, adhering to principles of beneficence, justice, respect for persons, and respect of law and public interest. For human subjects research, authors are expected to follow relevant laws and institutional practices (e.g., IRB review in the US).

Policy for Peer-Review Integrity

All SIGSAC-sponsored conferences adhere to ACM policies against harassment and the ACM Code of Ethics. Authors, PC members, and reviewers must follow ACM Publications Policies, including upholding the integrity of the peer review process and avoiding conflicts of interest. Violations will be penalized according to ACM policies.

Dates importantes

Dates de la conférence

Conference Date

30 juin 20253 juillet 2025

Soumission

First Cycle deadlines Submission

21 novembre 2024

Second Cycle deadlines Submission

16 mars 2025

Posters/Demo deadlines Submission

30 avril 2025

Notification

First Cycle deadlines Author Notification

15 janvier 2025

Second Cycle deadlines Author Notification

25 avril 2025

Posters/Demo deadlines Author Notification

8 mai 2025

Version finale

First Cycle deadlines Camera-ready

5 février 2025

Posters/Demo deadlines Camera-ready

12 mai 2025

Second Cycle deadlines Camera-ready

12 mai 2025

Inscription

Authors of accepted papers must register by

12 mai 2025

Early bird rates are available until

19 mai 2025

Classement source

Source: CORE2023

Classement: B

Domaine de recherche: Cybersecurity and privacy

Carte

Loading feedback section...