WiSec 2025 : 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks
Call For Paper (CFP) Description
The 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2025) will be held in person from June 30 to July 3, 2025, in Arlington, Virginia, USA.
ACM WiSec is the leading ACM and SIGSAC conference dedicated to all aspects of security and privacy in wireless and mobile networks and their applications. In addition to the traditional ACM WiSec topics of physical, link, and network layer security, we welcome papers focusing on the increasingly diverse range of mobile or wireless applications such as the Internet of Things, Cyber-Physical Systems, as well as the security and privacy of mobile software platforms, usable security and privacy, biometrics, and cryptography.
Topics of interest for WiSec include the following, concerning systems in the second list below:
Confidentiality, integrity, availability
Authentication, identity, authorization, access control models and policies, localization, key management (agreement or distribution),
Privacy of systems, devices, users, their locations and other attributes
Exploitation of systems, including through reverse engineering, fuzzing, hardware or software vulnerabilities, protocol vulnerabilities, side channels, fault injection, resource exhaustion, jamming, or other means.
Abuse of and through systems, including messaging abuse (spam, robocalls, etc.), theft of service, and fraud
Defenses for exploitation and abuse
Experiences developing, testing, and deploying production-ready or large-scale secure wireless systems
Formal analysis, formal verification, and proof-based security approaches
Information theoretical approaches for security
Usable security and privacy, human factors
Application of Machine Learning, e.g., for attack detection or privacy violations
Economic and social impacts to security and privacy
Wireless and Mobile Systems of Interest include:
Wireless networking protocols, for example: 802.11, Bluetooth, 802.15.4-based protocols, cellular air protocols including LTE and 5G-NR, Vehicle and industrial device protocols (e.g., LoRA), wireless for critical infrastructure (e.g., ADS-B, GPS, rail, satellites), NFC and smart payment applications Cryptographic primitives and protocols for wireless and mobile systems, including: WPA2, AKA, etc.
Wireless physical layer technologies: transmission, reception, modulation, localization, remote sensing (e.g., radar, mmWave sensing), jammers, dynamic spectrum reuse and cognitive radio systems
Wireless and mobile device hardware and software, for example: embedded devices, wearables (e.g., watches), smartphones, mobile sensors, home and industrial automation devices (e.g., IoT, Smart Home, utilities, etc.), healthcare devices, vehicles (e.g., drones, automotive, avionics, satelites), and payment systems
Wireless and mobile adjacent topics, including voice interfaces, visible light communications, sonic, underwater communications, legacy telecommunications, …
The proceedings of ACM WiSec, sponsored by SIGSAC, will be published by ACM.
Important dates
Please note: WiSec will have two rounds of submissions. In previous years, WiSec has had a tradition of announcing deadline extensions. Due to the change in the submission process, there will not be time for extensions this year and all deadlines are firm.
First Cycle deadline
Submission: Nov 21, 2024
Author Notification: Jan 15, 2025
Camera-ready: Feb 05, 2025
Second Cycle deadline
Submission: Mar 12, 2025
Author Notification: Apr 23, 2025
Camera-ready: May 12, 2025
Posters/Demo
Submission: Early May 2025
Notifications: Mid-May 2025
Camera-Ready: Late May 2025
WiSec conference: June 30 - July 3, 2025
Submission Guidelines
All papers for ACM WiSec 2025 must be submitted electronically through the HotCRP conference management system.
Only PDF files will be accepted. Submissions must be prepared using the following ACM proceedings template and must use US Letter page size (215.9 x 279.4 mm / 8.5 x 11 inches):
The ACM proceedings template for LaTeX can be found at Association for Computing Machinery (ACM) - SIG Proceedings Template.
Please look at ACM Primary Article Template for further information on ACM proceedings templates.
Full, short, and SoK papers
Full paper submissions to ACM WiSec 2025 can be up to 10 pages in the ACM conference style excluding the bibliography and well-marked appendices, and up to 12 pages in total. ACM WiSec also encourages the submission of short papers with a length of up to 6 pages (including bibliography and appendices), which describe mature work of a more succinct nature. All papers must be thoroughly anonymized for double-blind reviewing.
Detailed submission instructions will be made available as the deadline approaches.
In addition to regular papers that present novel contributions in the field, we solicit Systematization of Knowledge (SoK) papers that evaluate, systematize, and contextualize existing knowledge on any of the above topics. Suitable papers provide an important new viewpoint on an established research area, support or challenge long-held beliefs with compelling evidence, present a convincing new taxonomy of such an area, and/or identify research gaps with evidence and a structured approach. Survey papers without such contributions are not suitable. SoK submissions will be distinguished by the prefix “SoK:” in the title and a checkbox on the submission form. They can be up to 10 pages in the ACM conference style excluding the bibliography and well-marked appendices, and up to 15 pages overall. They will be reviewed by the program committee and held to the same standards as regular research papers, except instead of emphasizing novel research contributions the emphasis will be on value to the community. Accepted papers will be presented at the symposium and included in the proceedings.
Posters and demos
WiSec will solicit submission of posters and demos. The instructions to submit posters/demos will be made available on the WiSec 2025 website.
Artifact Evaluation label
In the spirit of open science, WiSec encourages authors of accepted papers to make software and data artifacts publicly available to the community.
Such artifacts will be evaluated by the artifact evaluation committee and corresponding papers will be granted an artifact evaluation label. While artifacts are optional, their availability will be positively considered during paper evaluation. Should the authors choose to submit their artifacts for evaluation, they should indicate their decision upon paper submission and follow the artifact submission guidelines in order to submit them upon paper acceptance. The detailed guidelines will be made available on the WiSec 2025 website.
Double submissions
It is a policy of the ACM to disallow double/simultaneous submissions, where the same (or substantially similar) paper is concurrently submitted to multiple conferences/journals. Any double submissions detected will be immediately rejected from all conferences/journals involved. Technical reports and pre-prints published online are allowed.
Workshops and Tutorial
ACM WiSec will host workshops/tutorials co-organized with the main conference. Details will be made available on the website.
ACM WiSec is the leading ACM and SIGSAC conference dedicated to all aspects of security and privacy in wireless and mobile networks and their applications. In addition to the traditional ACM WiSec topics of physical, link, and network layer security, we welcome papers focusing on the increasingly diverse range of mobile or wireless applications such as the Internet of Things, Cyber-Physical Systems, as well as the security and privacy of mobile software platforms, usable security and privacy, biometrics, and cryptography.
Topics of interest for WiSec include the following, concerning systems in the second list below:
Confidentiality, integrity, availability
Authentication, identity, authorization, access control models and policies, localization, key management (agreement or distribution),
Privacy of systems, devices, users, their locations and other attributes
Exploitation of systems, including through reverse engineering, fuzzing, hardware or software vulnerabilities, protocol vulnerabilities, side channels, fault injection, resource exhaustion, jamming, or other means.
Abuse of and through systems, including messaging abuse (spam, robocalls, etc.), theft of service, and fraud
Defenses for exploitation and abuse
Experiences developing, testing, and deploying production-ready or large-scale secure wireless systems
Formal analysis, formal verification, and proof-based security approaches
Information theoretical approaches for security
Usable security and privacy, human factors
Application of Machine Learning, e.g., for attack detection or privacy violations
Economic and social impacts to security and privacy
Wireless and Mobile Systems of Interest include:
Wireless networking protocols, for example: 802.11, Bluetooth, 802.15.4-based protocols, cellular air protocols including LTE and 5G-NR, Vehicle and industrial device protocols (e.g., LoRA), wireless for critical infrastructure (e.g., ADS-B, GPS, rail, satellites), NFC and smart payment applications Cryptographic primitives and protocols for wireless and mobile systems, including: WPA2, AKA, etc.
Wireless physical layer technologies: transmission, reception, modulation, localization, remote sensing (e.g., radar, mmWave sensing), jammers, dynamic spectrum reuse and cognitive radio systems
Wireless and mobile device hardware and software, for example: embedded devices, wearables (e.g., watches), smartphones, mobile sensors, home and industrial automation devices (e.g., IoT, Smart Home, utilities, etc.), healthcare devices, vehicles (e.g., drones, automotive, avionics, satelites), and payment systems
Wireless and mobile adjacent topics, including voice interfaces, visible light communications, sonic, underwater communications, legacy telecommunications, …
The proceedings of ACM WiSec, sponsored by SIGSAC, will be published by ACM.
Important dates
Please note: WiSec will have two rounds of submissions. In previous years, WiSec has had a tradition of announcing deadline extensions. Due to the change in the submission process, there will not be time for extensions this year and all deadlines are firm.
First Cycle deadline
Submission: Nov 21, 2024
Author Notification: Jan 15, 2025
Camera-ready: Feb 05, 2025
Second Cycle deadline
Submission: Mar 12, 2025
Author Notification: Apr 23, 2025
Camera-ready: May 12, 2025
Posters/Demo
Submission: Early May 2025
Notifications: Mid-May 2025
Camera-Ready: Late May 2025
WiSec conference: June 30 - July 3, 2025
Submission Guidelines
All papers for ACM WiSec 2025 must be submitted electronically through the HotCRP conference management system.
Only PDF files will be accepted. Submissions must be prepared using the following ACM proceedings template and must use US Letter page size (215.9 x 279.4 mm / 8.5 x 11 inches):
The ACM proceedings template for LaTeX can be found at Association for Computing Machinery (ACM) - SIG Proceedings Template.
Please look at ACM Primary Article Template for further information on ACM proceedings templates.
Full, short, and SoK papers
Full paper submissions to ACM WiSec 2025 can be up to 10 pages in the ACM conference style excluding the bibliography and well-marked appendices, and up to 12 pages in total. ACM WiSec also encourages the submission of short papers with a length of up to 6 pages (including bibliography and appendices), which describe mature work of a more succinct nature. All papers must be thoroughly anonymized for double-blind reviewing.
Detailed submission instructions will be made available as the deadline approaches.
In addition to regular papers that present novel contributions in the field, we solicit Systematization of Knowledge (SoK) papers that evaluate, systematize, and contextualize existing knowledge on any of the above topics. Suitable papers provide an important new viewpoint on an established research area, support or challenge long-held beliefs with compelling evidence, present a convincing new taxonomy of such an area, and/or identify research gaps with evidence and a structured approach. Survey papers without such contributions are not suitable. SoK submissions will be distinguished by the prefix “SoK:” in the title and a checkbox on the submission form. They can be up to 10 pages in the ACM conference style excluding the bibliography and well-marked appendices, and up to 15 pages overall. They will be reviewed by the program committee and held to the same standards as regular research papers, except instead of emphasizing novel research contributions the emphasis will be on value to the community. Accepted papers will be presented at the symposium and included in the proceedings.
Posters and demos
WiSec will solicit submission of posters and demos. The instructions to submit posters/demos will be made available on the WiSec 2025 website.
Artifact Evaluation label
In the spirit of open science, WiSec encourages authors of accepted papers to make software and data artifacts publicly available to the community.
Such artifacts will be evaluated by the artifact evaluation committee and corresponding papers will be granted an artifact evaluation label. While artifacts are optional, their availability will be positively considered during paper evaluation. Should the authors choose to submit their artifacts for evaluation, they should indicate their decision upon paper submission and follow the artifact submission guidelines in order to submit them upon paper acceptance. The detailed guidelines will be made available on the WiSec 2025 website.
Double submissions
It is a policy of the ACM to disallow double/simultaneous submissions, where the same (or substantially similar) paper is concurrently submitted to multiple conferences/journals. Any double submissions detected will be immediately rejected from all conferences/journals involved. Technical reports and pre-prints published online are allowed.
Workshops and Tutorial
ACM WiSec will host workshops/tutorials co-organized with the main conference. Details will be made available on the website.
Conference Topics
Frequently Asked Questions
What is WiSec 2025 : 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks?
WiSec 2025 : 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks is Join us at WiSec 2025, the 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks, in Arlington, Virginia, USA, from June 30 to July 3, 2025. Submit your papers, posters, and demos now!
How do I submit my paper to WiSec 2025 : 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks?
Submit your paper via the official submission portal at https://wisec2025.gmu.edu/. Follow the submission guidelines outlined in the CFP.
How do I register for the WiSec 2025 : 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks?
Register at https://wisec2025.gmu.edu/. Early registration is recommended to secure your spot and avail discounts.
What are the important dates for WiSec 2025 : 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks?
- Start Date: 30 Jun, 2025
- End Date: 03 Jul, 2025
- End Date: 03 Jul, 2025
What is the location and date of WiSec 2025 : 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks?
WiSec 2025 : 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks will be held on 30 Jun, 2025 - 03 Jul, 2025 at Arlington, Virginia, USA. More details about the event location and travel arrangements can be found on the conference’s official website.
What is the location of WiSec 2025 : 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks?
WiSec 2025 : 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks will be held at Arlington, Virginia, USA.
Can I submit more than one paper to WiSec 2025 : 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks?
Yes, multiple submissions are allowed, provided they align with the conference’s themes and topics. Each submission will be reviewed independently.
What is the review process for submissions?
Papers will be reviewed by a panel of experts in the field, ensuring that only high-quality, relevant work is selected for presentation. Each paper will be evaluated on originality, significance, and clarity.
What presentation formats are available at WiSec 2025 : 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks?
Presentations can be made in various formats including oral presentations, poster sessions, or virtual presentations. Specific details will be provided upon acceptance of your paper.
Can I make changes to my submission after I’ve submitted it?
Modifications to your submission are allowed until the submission deadline. After that, no changes can be made. Please make sure all details are correct before submitting.
What are the benefits of attending WiSec 2025 : 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks?
Attending WiSec 2025 : 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks provides an opportunity to present your research, network with peers and experts in your field, and gain feedback on your work. Additionally, it is an excellent platform for career advancement and collaboration opportunities.
What should I include in my abstract or proposal submission?
Your abstract or proposal should include a concise summary of your paper, including its purpose, methodology, and key findings. Ensure that it aligns with the conference themes.