Call for Papers
Contact email: firstname.lastname@example.org
Submission link: https://wisec23-winter.hotcrp.com
Download call for papers in TXT format.
The 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2023) will be held physically from May 29 to June 1, 2023 in Guildford, UK. It is planned to be a fully in-person event if the COVID-19 pandemic situation allows this. Otherwise, the conference will be moved to the virtual space.
ACM WiSec is the leading ACM and SIGSAC conference dedicated to all aspects of security and privacy in wireless and mobile networks and their applications. In addition to the traditional ACM WiSec topics of physical, link, and network layer security, we welcome papers focusing on the increasingly diverse range of mobile or wireless applications such as Internet of Things, Cyber-Physical Systems, as well as the security and privacy of mobile software platforms, usable security and privacy, biometrics, and cryptography.
Topics of interest for WiSec include the following, concerning systems in the next second list below:
- Confidentiality, integrity, availability
- Authentication, identity, authorization, access control models and policies, localization, key management (agreement or distribution),
- Privacy of systems, devices, users, their locations and other attributes
- Exploitation of systems, including through reverse engineering, fuzzing, hardware or software vulnerabilities, protocol vulnerabilities, side channels, fault injection, resource exhaustion, jamming, or other means.
- Abuse of and through systems, including messaging abuse (spam, robocalls, etc.), theft of service, and fraud
- Defenses for exploitation and abuse
- Experiences developing, testing, and deploying production-ready or large-scale secure wireless systems
- Formal analysis, formal verification, and proof-based security approaches
- Information theoretical approaches for security
- Usable security and privacy, human factors
- Application of Machine Learning, e.g., for attack detection or privacy violations
- Economic and social impacts to security and privacy
Wireless and Mobile Systems of Interest include:
- Wireless networking protocols, for example: 802.11, Bluetooth, 802.15.4-based protocols, cellular air protocols including LTE and 5G-NR, Vehicle and industrial device protocols (e.g., LoRA), wireless for critical infrastructure (e.g., ADS-B, GPS, rail, satellites), NFC and smart payment applications
- Cryptographic primitives and protocols for wireless and mobile systems, including: WPA2, AKA, …
- Wireless physical layer technologies: transmission, reception, modulation, localization, remote sensing (e.g., radar, mmWave sensing), jammers, dynamic spectrum reuse and cognitive radio systems
- Wireless and mobile device hardware and software, for example: embedded devices, wearables (e.g., watches), smartphones, mobile sensors, home and industrial automation devices (e.g., IoT, Smart Home, utilities, etc.), healthcare devices, vehicles (e.g., drones, automotive, avionics, satelites), and payment systems
- Wireless and mobile adjacent topics, including voice interfaces, visible light communications, sonic, underwater communications, legacy telecommunications, …
The proceedings of ACM WiSec, sponsored by SIGSAC, will be published by the ACM.
Please note: in 2023, WiSec will introduce two rounds of submission deadlines. In previous years, WiSec has had a tradition of announcing deadline extensions. Due to the change in submission process, there will be no extensions this year.
- First submission round
Paper submission deadline: November 17th, 2022 (23:59 AoE) (no extensions) Author notification: December 20th, 2022 Camera-ready deadline: January 14th, 2023
- Second submission round
Paper submission deadline: February 17th, 2023 (23:59 AoE) (no extensions) Author notification: March 29th, 2023
- Camera-ready deadline: April 17th, 2023
- WiSec conference: May 29th to June 1st, 2023
Papers rejected in the first round can be resubmitted to the second round. For such resubmissions, authors can choose to have the same reviewers and should provide a letter detailing revisions in that case.
All papers for ACM WiSec 2023 must be submitted electronically through the HotCRP conference management system.
Only PDF files will be accepted. Submissions must be prepared using the following ACM proceedings template and must use US Letter page size (215.9 x 279.4 mm / 8.5 x 11 inches):
- Please look at https://www.acm.org/publications/proceedings-template for the latest version of the ACM proceedings templates and for further information on ACM publications
Full, short, and SoK papers
Full paper submissions to ACM WiSec 2023 can be up to 10 pages in the ACM conference style excluding the bibliography and well-marked appendices, and up to 12 pages in total. ACM WiSec also encourages the submission of short papers with a length of up to 6 pages (including bibliography and appendices), which describe mature work of a more succinct nature. All papers must be thoroughly anonymized for double-blind reviewing. Detailed submission instructions will be made available on the WiSec 2023 website.
In addition to regular papers that present novel contributions in the field, we solicit Systematization of Knowledge (SoK) papers that evaluate, systematize, and contextualize existing knowledge on any of the above topics. Suitable papers provide an important new viewpoint on an established research area, support or challenge long-held beliefs with compelling evidence, present a convincing new taxonomy of such an area, and/or identify research gaps with evidence and a structured approach. Survey papers without such contributions are not suitable. SoK submissions will be distinguished by the prefix “SoK:” in the title and a checkbox on the submission form. They can be up to 10 pages in the ACM conference style excluding the bibliography and well-marked appendices, and up to 15 pages overall. They will be reviewed by the program committee and held to the same standards as regular research papers, except instead of emphasizing novel research contributions the emphasis will be on value to the community. Accepted papers will be presented at the symposium and included in the proceedings.
ACM WiSec 2023 invites papers (ACM conference style, up to 3 pages excluding references) that present personal perspectives on all aspects of security and privacy in wireless and mobile networks.
Opinion papers could also criticize previous research or research directions, as well as highlight possible promising research directions. The opinions expressed in these papers are expected to be anyway corroborated by theoretical foundations, experiments, or experiences. Like the regular papers, the opinion papers will be reviewed by the WiSec Technical Program Committee. The selected opinion papers will be a part of the WiSec technical program and will be published in the conference proceedings. Opinion papers should be submitted using the same submission procedure adopted for the full papers. The title of these papers must have the prefix “OPINION: “.
Posters and demos
All posters and demos for ACM WiSec 2023 must be submitted electronically to email@example.com.
For posters and demos, authors should submit up to 2-page extended abstract, following the same guidelines as for regular papers. Demo submissions should include a brief description of what the audience will get to see during the conference. You may submit a URL pointing to a preview of what you would like to present with your abstract.
All poster titles must be prefixed with the keyword “Poster: " and all demo titles must be be prefixed with “DEMO: “. Posters and demos do not need to be anonymous.
Artifact Evaluation label
In the spirit of open science, WiSec encourages authors of accepted papers to make software and data artifacts publicly available to the community. Such artifacts will be evaluated by the artifact evaluation committee and corresponding papers will be granted an artifact evaluation label. While artifacts are optional, their availability will be positively considered during paper evaluation. Should the authors choose to submit their artifacts for evaluation, they should indicate their decision upon paper submission and follow the artifact submission guidelines in order to submit them upon paper acceptance. The detailed guidelines can be found at https://wisec2023.surrey.ac.uk/call-for-artifacts/.
It is a policy of the ACM to disallow double/simultaneous submissions, where the same (or substantially similar) paper is concurrently submitted to multiple conferences/journals. Any double submissions detected will be immediately rejected from all conferences/journals involved. Technical reports and pre-prints published online are allowed.
Ethical conduct of research is critical to ensuring the public trust and support of science. All submitted papers will be reviewed for ethical concerns, and if ethical practices were not followed a paper will be rejected regardless of any other merit. Ethical concerns vary from project to project, so there is no “one size fits all” approach. Rather, researchers should consider ethical analysis to be an integral part of the research, just as evaluation and method design are. Ethics should be considered early in a project, during a project, and as the project is prepared for publication.
While every situation is unique, there are principles that researchers should consider and apply during their projects. The Menlo Report provides guidance and examples for network security. Principally, all research should embody the concepts of beneficence, justice, respect for persons, and respect of law and public interest. This is just as true for technical research as human subjects research. For example, if it is possible that a research method could cause harm to systems or users (e.g., testing jamming) researchers should explicitly detail the measures taken to prevent harm.
Research ethics is also paramount in any study that could be classified as “human subjects.” For WiSec, “human subject research” is defined as “research that involves interaction with identifiable humans or analysis of datasets containing data from one or more identifiable living humans.” Researchers are expected to follow the laws and common practices regarding human subjects review of their relevant jurisdictions and institutions. For example, researchers in the United States must undergo review by an Institutional Review Board (IRB) before beginning human subjects research. Authors doing human subjects research should mention the review standards in their jurisdictions and if they were met.
Computer security and privacy research often studies and even advances tools and techniques with the capacity to harm others. In their submission, authors must convince reviewers that appropriate steps were taken to disclose newly discovered vulnerabilities to appropriate parties
Policy for Peer-Review Integrity
All SIGSAC sponsored conferences and workshops are required to follow ACM policies against harassment activities (https://www.acm.org/about-acm/policy-against-harassment) and ACM Code of Ethics and Professional Conduct (https://www.acm.org/code-of-ethics). Also all authors, PC members and non-PC reviewers are required to follow ACM Publications Policies (https://www.acm.org/publications/policies/toc). Particularly, we require all reviewers to uphold the integrity of the peer review process and avoid conflict of interest of any form (e.g., reviewer collusion ring). Those who violate these policies will be penalized according to ACM policies (https://www.acm.org/publications/policies/penalties-for-publication-violations). If you would like to report a violation, please contact program chairs of your conferences/workshops or SIGSAC officers. We are committed to protecting the confidentiality of your communication.