Conference Information
WiSec 2025: ACM Conference on Security and Privacy in Wireless and Mobile Networks
https://wisec2025.gmu.edu/
Submission Date:
2025-03-12
Notification Date:
2025-04-23
Conference Date:
2025-06-30
Location:
Arlington, Virginia, USA
Years:
18
CCF: c   QUALIS: b1   Viewed: 39638   Tracked: 79   Attend: 11

Call For Papers
The 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2025) will be held in person from June 30 to July 3, 2025, in Arlington, Virginia, USA.

ACM WiSec is the leading ACM and SIGSAC conference dedicated to all aspects of security and privacy in wireless and mobile networks and their applications. In addition to the traditional ACM WiSec topics of physical, link, and network layer security, we welcome papers focusing on the increasingly diverse range of mobile or wireless applications such as the Internet of Things, Cyber-Physical Systems, as well as the security and privacy of mobile software platforms, usable security and privacy, biometrics, and cryptography.

Topics of interest for WiSec include the following, concerning systems in the second list below:

    Confidentiality, integrity, availability
    Authentication, identity, authorization, access control models and policies, localization, key management (agreement or distribution),
    Privacy of systems, devices, users, their locations and other attributes
    Exploitation of systems, including through reverse engineering, fuzzing, hardware or software vulnerabilities, protocol vulnerabilities, side channels, fault injection, resource exhaustion, jamming, or other means.
    Abuse of and through systems, including messaging abuse (spam, robocalls, etc.), theft of service, and fraud
    Defenses for exploitation and abuse
    Experiences developing, testing, and deploying production-ready or large-scale secure wireless systems
    Formal analysis, formal verification, and proof-based security approaches
    Information theoretical approaches for security
    Usable security and privacy, human factors
    Application of Machine Learning, e.g., for attack detection or privacy violations
    Economic and social impacts to security and privacy

Wireless and Mobile Systems of Interest include:

    Wireless networking protocols, for example: 802.11, Bluetooth, 802.15.4-based protocols, cellular air protocols including LTE and 5G-NR, Vehicle and industrial device protocols (e.g., LoRA), wireless for critical infrastructure (e.g., ADS-B, GPS, rail, satellites), NFC and smart payment applications Cryptographic primitives and protocols for wireless and mobile systems, including: WPA2, AKA, etc.
    Wireless physical layer technologies: transmission, reception, modulation, localization, remote sensing (e.g., radar, mmWave sensing), jammers, dynamic spectrum reuse and cognitive radio systems
    Wireless and mobile device hardware and software, for example: embedded devices, wearables (e.g., watches), smartphones, mobile sensors, home and industrial automation devices (e.g., IoT, Smart Home, utilities, etc.), healthcare devices, vehicles (e.g., drones, automotive, avionics, satelites), and payment systems
    Wireless and mobile adjacent topics, including voice interfaces, visible light communications, sonic, underwater communications, legacy telecommunications, …

The proceedings of ACM WiSec, sponsored by SIGSAC, will be published by ACM.
Last updated by Dou Sun in 2024-11-24
Acceptance Ratio
YearSubmittedAcceptedAccepted(%)
2014962526%
2013702637.1%
2012681725%
2011921920.7%
2010992121.2%
20091072826.2%
2008961616.7%
Related Conferences