Author Instruction
All papers must be original and not simultaneously submitted to another journal or conference.
The contributions to MobiSec 2025 must be submitted to the conference submission system:
https://easychair.org/conferences?conf=mobisec2025
TOPICS (not limited to)
- Security for 5G/6G and Next-Generation Mobile Networks
- Quantum Security
- Mobile, Wireless, and Cellular System Security
- Network/Edge/Cloud Security and Infrastructure Protection
- Data Security and Privacy in Edge and Distributed Environments
- (Post-Quantum) Cryptography, Lightweight/Advanced Encryption, and Side-Channel Countermeasures
- Security for IoT and Cyber-Physical Systems
- Embedded Systems and Hardware Security
- Trusted Execution Environments and Trustworthy Computing
- Security for AI Systems and Applications of AI in Security (e.g., AI-Driven Threat Detection)
- Digital Forensics and Malware Analysis in Mobile Ecosystems
- Secure Access Control, Authentication, and Authorization
- Secure Protocol Design and Real-World Protocol Analysis
- Blockchain and Distributed Ledger Security
- Supply Chain Security and Digital Platform Ecosystem Resilience
- Automated Tools for Software/Binary Vulnerability Analysis
- Operating System, Storage, and File System Security
- Web and Application Security
- HCI Security and Privacy (e.g., for Wearables and Smart Devices)
- Security for Unmanned Systems (Vehicles, Drones, Ships)
- Denial-of-Service Attacks and Botnet Defense
- Exploit Techniques, Vulnerability Research, and Practical Cryptanalysis
- Privacy-Preserving Technologies (e.g., Anonymity, Anti-Censorship Tools)
- Security Policy, Management, and Governance Models
- Safety and Security Issues in Digital Transformation and Industry 4.0/5.0 Platforms
- Emerging Trends and Challenges in Mobile Internet and Application Security
- Case Studies and Practical Security Applications in Real-World Environments
- Others and Emerging New Topics in Mobile Internet Security
(1) Regular Paper
Authors are invited to submit original papers: they must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to any other conferences that have proceedings. An accepted paper must be registered before the registration deadline and presented at the symposium. Failure to register before the deadline will result in automatic withdrawal of the paper from the conference proceedings and the program.
- The submission file is in PDF or PS file format produced via
- Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper at the conference.
- During submission, authors need to select “MobiSec 2025 - Main Track” for their paper.
(2) Poster Paper
The submission should be a single PDF document consisting of (i) the poster abstract and (ii) the poster draft.
Poster abstract: Poster abstract should provide sufficient details about your research showing that you have adequate information to fill a poster.
Poster abstract should meet the following requirements:
- No more than 2-pages, including references and figures
- Submission should not be anonymized
- The submission file is in PDF or PS file format produced via the Easychair Latex Class file (US letter size) like Regular Paper.
Poster draft: All submission must also include draft of the poster to receive feedback from the committee before the symposium. Poster size should be 32x40 inches but can be scaled down to “letter” paper size.
The accepted posters will not be formally published, and their copyright will be owned by their authors. Therefore, authors can present or publish any content of their poster in other conference or journal. Moreover, we will welcome the latest research outcomes, which were introduced at other venue.
During submission, please select "MobiSec 2025 - Poster Track"
TOPICS (not limited to)
- Security for 5G/6G and Next-Generation Mobile Networks
- Quantum Security
- Mobile, Wireless, and Cellular System Security
- Network/Edge/Cloud Security and Infrastructure Protection
- Data Security and Privacy in Edge and Distributed Environments
- (Post-Quantum) Cryptography, Lightweight/Advanced Encryption, and Side-Channel Countermeasures
- Security for IoT and Cyber-Physical Systems
- Embedded Systems and Hardware Security
- Trusted Execution Environments and Trustworthy Computing
- Security for AI Systems and Applications of AI in Security (e.g., AI-Driven Threat Detection)
- Digital Forensics and Malware Analysis in Mobile Ecosystems
- Secure Access Control, Authentication, and Authorization
- Secure Protocol Design and Real-World Protocol Analysis
- Blockchain and Distributed Ledger Security
- Supply Chain Security and Digital Platform Ecosystem Resilience
- Automated Tools for Software/Binary Vulnerability Analysis
- Operating System, Storage, and File System Security
- Web and Application Security
- HCI Security and Privacy (e.g., for Wearables and Smart Devices)
- Security for Unmanned Systems (Vehicles, Drones, Ships)
- Denial-of-Service Attacks and Botnet Defense
- Exploit Techniques, Vulnerability Research, and Practical Cryptanalysis
- Privacy-Preserving Technologies (e.g., Anonymity, Anti-Censorship Tools)
- Security Policy, Management, and Governance Models
- Safety and Security Issues in Digital Transformation and Industry 4.0/5.0 Platforms
- Emerging Trends and Challenges in Mobile Internet and Application Security
- Case Studies and Practical Security Applications in Real-World Environments
- Others and Emerging New Topics in Mobile Internet Security
(1) Regular Paper
Authors are invited to submit original papers: they must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to any other conferences that have proceedings. An accepted paper must be registered before the registration deadline and presented at the symposium. Failure to register before the deadline will result in automatic withdrawal of the paper from the conference proceedings and the program.
- The submission file is in PDF or PS file format produced via
· the Easychair Latex Class file (US letter size)
[Available at https://easychair.org/publications/easychair.zip]
· the Easychair Microsoft Word file
[Available at https://easychair.org/publications/easychair.docx]
- Each paper should be at least 5 pages long based on the Easychair style.
[Available at https://easychair.org/publications/easychair.zip]
· the Easychair Microsoft Word file
[Available at https://easychair.org/publications/easychair.docx]
- Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper at the conference.
- During submission, authors need to select “MobiSec 2025 - Main Track” for their paper.
(2) Poster Paper
The submission should be a single PDF document consisting of (i) the poster abstract and (ii) the poster draft.
Poster abstract: Poster abstract should provide sufficient details about your research showing that you have adequate information to fill a poster.
Poster abstract should meet the following requirements:
- No more than 2-pages, including references and figures
- Submission should not be anonymized
- The submission file is in PDF or PS file format produced via the Easychair Latex Class file (US letter size) like Regular Paper.
Poster draft: All submission must also include draft of the poster to receive feedback from the committee before the symposium. Poster size should be 32x40 inches but can be scaled down to “letter” paper size.
The accepted posters will not be formally published, and their copyright will be owned by their authors. Therefore, authors can present or publish any content of their poster in other conference or journal. Moreover, we will welcome the latest research outcomes, which were introduced at other venue.
During submission, please select "MobiSec 2025 - Poster Track"