WISEC 2023 : 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks
Conference Series : Wireless Network Security
Call For Papers
The 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2023)
will be held physically from May 29 to June 1, 2023 in Guildford, UK. It is planned to be a fully in-person event if the COVID-19 pandemic situation allows this. Otherwise, the conference will be moved to the virtual space.
ACM WiSec is the leading ACM and SIGSAC conference dedicated to all aspects of security and privacy in wireless and mobile networks and their applications. In addition to the traditional ACM WiSec topics of physical, link, and network layer security, we welcome papers focusing on the increasingly diverse range of mobile or wireless applications such as Internet of Things, Cyber-Physical Systems, as well as the security and privacy of mobile software platforms, usable security and privacy, biometrics, and cryptography.
Topics of interest for WiSec include the following, concerning systems in the next second list below:
- Confidentiality, integrity, availability
- Authentication, identity, authorization, access control models and policies, localization,
key management (agreement or distribution),
- Privacy of systems, devices, users, their locations and other attributes
- Exploitation of systems, including through reverse engineering, fuzzing, hardware or
software vulnerabilities, protocol vulnerabilities, side channels, fault injection, resource
exhaustion, jamming, or other means.
- Abuse of and through systems, including messaging abuse (spam, robocalls, etc.), theft
of service, and fraud
- Defenses for exploitation and abuse
- Experiences developing, testing, and deploying production-ready or large-scale secure
- Formal analysis, formal verification, and proof-based security approaches
- Information theoretical approaches for security
- Usable security and privacy, human factors
- Application of Machine Learning, e.g., for attack detection or privacy violations
- Economic and social impacts to security and privacy
Wireless and Mobile Systems of Interest include:
- Wireless networking protocols, for example: 802.11, Bluetooth, 802.15.4-based protocols, cellular air protocols including LTE and 5G-NR, Vehicle and industrial device protocols (e.g., LoRA), wireless for critical infrastructure (e.g., ADS-B, GPS, rail, satellites), NFC and smart payment applications
- Cryptographic primitives and protocols for wireless and mobile systems, including: WPA2, AKA, ...
- Wireless physical layer technologies: transmission, reception, modulation, localization, remote sensing (e.g., radar, mmWave sensing), jammers, dynamic spectrum reuse and cognitive radio systems
- Wireless and mobile device hardware and software, for example: embedded devices, wearables (e.g., watches), smartphones, mobile sensors, home and industrial automation devices (e.g., IoT, Smart Home, utilities, etc.), healthcare devices, vehicles (e.g., drones, automotive, avionics, satelites), and payment systems
- Wireless and mobile adjacent topics, including voice interfaces, visible light communications, sonic, underwater communications, legacy telecommunications, ...
The proceedings of ACM WiSec, sponsored by SIGSAC, will be published by the ACM.
## Important dates
Please note: in 2023, WiSec will introduce two rounds of submission deadlines. In previous years, WiSec has had a tradition of announcing deadline extensions. Due to the change in submission process, there will be no extensions this year.
- First submission round
- Paper submission deadline: November 17th, 2022 (23:59 AoE) (no extensions)
- Author notification: December 20th, 2022
- Camera-ready deadline: January 14th, 2023
- Second submission round
- Paper submission deadline: February 17th, 2023 (23:59 AoE) (no extensions)
- Author notification: March 29th, 2023
- Camera-ready deadline: April 17th, 2023
- WiSec conference: May 29th to June 1st, 2023
Papers rejected in the first round can be resubmitted to the second round. For such resubmissions, authors can choose to have the same reviewers and should provide a letter detailing revisions in that case.
Full, short, and SoK papers
Full paper submissions to ACM WiSec 2023 can be up to 10 pages in the ACM conference style excluding the bibliography and well-marked appendices, and up to 12 pages in total. ACM WiSec also encourages the submission of short papers with a length of up to 6 pages (including bibliography and appendices), which describe mature work of a more succinct nature. All papers must be thoroughly anonymized for double-blind reviewing. Detailed submission instructions will be made available on the WiSec 2023 website.
In addition to regular papers that present novel contributions in the field, we solicit Systematization of Knowledge (SoK) papers that evaluate, systematize, and contextualize existing knowledge on any of the above topics. Suitable papers provide an important new viewpoint on an established research area, support or challenge long-held beliefs with compelling evidence, present a convincing new taxonomy of such an area, and/or identify research gaps with evidence and a structured approach. Survey papers without such contributions are not suitable. SoK submissions will be distinguished by the prefix "SoK:" in the title and a checkbox on the submission form. They can be up to 10 pages in the ACM conference style excluding the bibliography and well-marked appendices, and up to 15 pages overall. They will be reviewed by the program committee and held to the same standards as regular research papers, except instead of emphasizing novel research contributions the emphasis will be on value to the community. Accepted papers will be presented at the symposium and included in the proceedings.
ACM WiSec 2023 invites papers (ACM conference style, up to 3 pages excluding references) that present personal perspectives on all aspects of security and privacy in wireless and mobile networks.
Opinion papers could also criticize previous research or research directions, as well as highlight possible promising research directions. The opinions expressed in these papers are expected to be anyway corroborated by theoretical foundations, experiments, or experiences. Like the regular papers, the opinion papers will be reviewed by the WiSec Technical Program Committee. The selected opinion papers will be a part of the WiSec technical program and will be published in the conference proceedings. Opinion papers should be submitted using the same submission procedure adopted for the full papers. The title of these papers must have the prefix "OPINION: ".
Posters and demos
WiSec will solicit submission of posters and demos. The instructions to submit posters/demos will be made available on the WiSec 2023 website.
Artifact Evaluation label
In the spirit of open science, WiSec encourages authors of accepted papers to make software and data artifacts publicly available to the community.
Such artifacts will be evaluated by the artifact evaluation committee and corresponding papers will be granted an artifact evaluation label. While artifacts are optional, their availability will be positively considered during paper evaluation. Should the authors choose to submit their artifacts for evaluation, they should indicate their decision upon paper submission and follow the artifact submission guidelines in order to submit them upon paper acceptance. The detailed guidelines will be made available on the WiSec 2023 website.
It is a policy of the ACM to disallow double/simultaneous submissions, where the same (or substantially similar) paper is concurrently submitted to multiple conferences/journals. Any double submissions detected will be immediately rejected from all conferences/journals involved. Technical reports and pre-prints published online are allowed.
Workshops and Tutorial
ACM WiSec will host workshops/tutorials co-organized with the main conference. Details will be made available on the website.
Ethical conduct of research is critical to ensuring the public trust and support of science. All submitted papers will be reviewed for ethical concerns, and if ethical practices were not followed a paper will be rejected regardless of any other merit. Ethical concerns vary from project to project, so there is no "one size fits all" approach. Rather, researchers should consider ethical analysis to be an integral part of the research, just as evaluation and method design are. Ethics should be considered early in a project, during a project, and as the project is prepared for publication.
While every situation is unique, there are principles that researchers should consider and apply during their projects. The Menlo Report provides guidance and examples for network security. Principally, all research should embody the concepts of beneficence, justice, respect for persons, and respect of law and public interest. This is just as true for technical research as human subjects research. For example, if it is possible that a research method could cause harm to systems or users (e.g., testing jamming) researchers should explicitly detail the measures taken to prevent harm.
Research ethics is also paramount in any study that could be classified as "human subjects." For WiSec, "human subject research" is defined as "research that involves interaction with identifiable humans or analysis of datasets containing data from one or more identifiable living humans." Researchers are expected to follow the laws and common practices regarding human subjects review of their relevant jurisdictions and institutions. For example, researchers in the United States must undergo review by an Institutional Review Board (IRB) before beginning human subjects research. Authors doing human subjects research should mention the review standards in their jurisdictions and if they were met.
Computer security and privacy research often studies and even advances tools and techniques with the capacity to harm others. In their submission, authors must convince reviewers that appropriate steps were taken to disclose newly discovered vulnerabilities to appropriate parties
Policy for Peer-Review Integrity
All SIGSAC sponsored conferences and workshops are required to follow ACM policies against harassment activities (https://www.acm.org/about-acm/policy-against-harassment) and ACM Code of Ethics and Professional Conduct (https://www.acm.org/code-of-ethics). Also all authors, PC members and non-PC reviewers are required to follow ACM Publications Policies (https://www.acm.org/publications/policies/toc). Particularly, we require all reviewers to uphold the integrity of the peer review process and avoid conflict of interest of any form (e.g., reviewer collusion ring). Those who violate these policies will be penalized according to ACM policies (https://www.acm.org/publications/policies/penalties-for-publication-violations). If you would like to report a violation, please contact program chairs of your conferences/workshops or SIGSAC officers. We are committed to protecting the confidentiality of your communication.