
30 juin - 03 juillet 2025
ACM Conference on Security and Privacy in Wireless and Mobile Networks
Aucun abonné pour le moment.
Aperçu
The 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2025) will take place from June 30 to July 3, 2025, in Arlington, Virginia, USA, hosted by George Mason University. ACM WiSec is a premier conference focused on security and privacy in wireless and mobile networks, IoT, cyber-physical systems, and related areas, attracting researchers, students, and industry professionals.
Call for Papers: ACM WiSec 2025
The 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2025) will be held in person from June 30 to July 3, 2025, in Arlington, Virginia, USA.
About ACM WiSec
ACM WiSec is the leading ACM and SIGSAC conference dedicated to all aspects of security and privacy in wireless and mobile networks and their applications, mobile software platforms, the Internet of Things, cyber-physical systems, usable security and privacy, biometrics, and cryptography. It is a competitive, high-quality conference well-attended by industry, government, and academia.
Topics of Interest
Topics of interest for WiSec include:
- Confidentiality, integrity, availability
- Authentication, identity, authorization, access control models and policies, localization, key management (agreement or distribution)
- Privacy of systems, devices, users, their locations and other attributes
- Exploitation of systems, including through reverse engineering, fuzzing, hardware or software vulnerabilities, protocol vulnerabilities, side channels, fault injection, resource exhaustion, jamming, or other means.
- Abuse of and through systems, including messaging abuse (spam, robocalls, etc.), theft of service, and fraud
- Defenses for exploitation and abuse
- Experiences developing, testing, and deploying production-ready or large-scale secure wireless systems
- Formal analysis, formal verification, and proof-based security approaches
- Information theoretical approaches for security
- Usable security and privacy, human factors
- Application of Machine Learning, e.g., for attack detection or privacy violations
- Economic and social impacts to security and privacy
Wireless and Mobile Systems of Interest
- Wireless networking protocols, for example: 802.11, Bluetooth, 802.15.4-based protocols, cellular air protocols including LTE and 5G-NR, Vehicle and industrial device protocols (e.g., LoRA), wireless for critical infrastructure (e.g., ADS-B, GPS, rail, satellites), NFC and smart payment applications
- Cryptographic primitives and protocols for wireless and mobile systems, including: WPA2, AKA, etc.
- Wireless physical layer technologies: transmission, reception, modulation, localization, remote sensing (e.g., radar, mmWave sensing), jammers, dynamic spectrum reuse and cognitive radio systems
- Wireless and mobile device hardware and software, for example: embedded devices, wearables (e.g., watches), smartphones, mobile sensors, home and industrial automation devices (e.g., IoT, Smart Home, utilities, etc.), healthcare devices, vehicles (e.g., drones, automotive, avionics, satellites), and payment systems
- Wireless and mobile adjacent topics, including voice interfaces, visible light communications, sonic, underwater communications, legacy telecommunications, …
Important Dates
- First Cycle Deadlines:
- Submission: November 21, 2024
- Author Notification: January 15, 2025
- Camera-ready: February 5, 2025
- Second Cycle Deadlines:
- Submission: March 16, 2025 (AOE)
- Author Notification: April 25, 2025
- Camera-ready: May 12, 2025
- Posters/Demo Deadlines:
- Submission: April 30, 2025 (AOE)
- Author Notification: May 8, 2025
- Camera-ready: May 12, 2025
Note: All deadlines are firm.
Submission Guidelines
- All papers must be submitted electronically through the HotCRP conference management system:
- Cycle 1: HotCRP submission site for Cycle 1
- Cycle 2: HotCRP submission site for Cycle 2
- Only PDF files will be accepted.
- Submissions must be prepared using the ACM proceedings template and use US Letter page size (8.5 x 11 inches).
Full, Short, and SoK Papers
- Full papers: At most 10 pages (excluding bibliography and appendices), up to 12 pages total.
- Short papers: Up to 6 pages (including bibliography and appendices).
- SoK papers: Up to 10 pages (excluding bibliography and appendices), up to 15 pages total. Title must be prefixed with "SoK:".
- All papers must be anonymized for double-blind review.
Posters and Demos
Instructions for poster and demo submissions will be made available on the WiSec 2025 website.
Artifact Evaluation
WiSec encourages authors to make software and data artifacts publicly available. Artifacts will be evaluated, and corresponding papers may be granted an artifact evaluation label.
Double Submissions
Double/simultaneous submissions to other conferences/journals are not allowed and will result in immediate rejection.
Registration
- Registration is now open.
- Authors of accepted papers must register by May 12, 2025.
- Early bird rates are available until May 19, 2025.
Travel Grants for Students
ACM WiSec 2025 offers a limited number of travel grants for students who have registered and co-authored an accepted paper. Grants are competitive and intended to reimburse travel expenses.
- Maximum of two students per institution.
- Not eligible for postdoctoral researchers, faculty members, or senior research personnel.
- Grant recipients may receive up to $1,000 for documented expenses (registration, airfare, lodging).
- To apply, please complete and submit the travel grant form (Note: Link is illustrative).
Research Ethics
All submitted papers will be reviewed for ethical concerns. Researchers should consider ethical analysis an integral part of their research, adhering to principles of beneficence, justice, respect for persons, and respect of law and public interest. For human subjects research, authors are expected to follow relevant laws and institutional practices (e.g., IRB review in the US).
Policy for Peer-Review Integrity
All SIGSAC-sponsored conferences adhere to ACM policies against harassment and the ACM Code of Ethics. Authors, PC members, and reviewers must follow ACM Publications Policies, including upholding the integrity of the peer review process and avoiding conflicts of interest. Violations will be penalized according to ACM policies.
Dates de la conférence
Conference Date
30 juin 2025 → 3 juillet 2025
Soumission
First Cycle deadlines Submission
21 novembre 2024
Second Cycle deadlines Submission
16 mars 2025
Posters/Demo deadlines Submission
30 avril 2025
Notification
First Cycle deadlines Author Notification
15 janvier 2025
Second Cycle deadlines Author Notification
25 avril 2025
Posters/Demo deadlines Author Notification
8 mai 2025
Version finale
First Cycle deadlines Camera-ready
5 février 2025
Posters/Demo deadlines Camera-ready
12 mai 2025
Second Cycle deadlines Camera-ready
12 mai 2025
Inscription
Authors of accepted papers must register by
12 mai 2025
Early bird rates are available until
19 mai 2025
Classement source
Source: CORE2023
Classement: B
Domaine de recherche: Cybersecurity and privacy