- This event has passed.
July 18 8:00 am - July 20 6:00 pm EDT
Title: 10th Annual Conference on Security and Privacy in Wireless and Mobile Networks (WiSEC)
Host: Northeastern University, College of Computer and Information Science
Location: Northeastern University, 805 Columbus Avenue, Interdisciplinary Science and Engineering Complex (ISEC), 1st Floor, Auditorium, Boston, Massachusetts 02120
ACM WiSec is the leading ACM and SIGSAC conference dedicated to all aspects of security and privacy in wireless and mobile networks and their applications. In addition to the traditional ACM WiSec topics of physical, link, and network layer security, we welcome papers focusing on the security and privacy of mobile software platforms, usable security and privacy, biometrics, cryptography, and the increasingly diverse range of mobile or wireless applications such as Internet of Things, and Cyber-Physical Systems. The conference welcomes both theoretical as well as systems contributions.
Topics of interest include, but are not limited to:
- Security and privacy for smart devices (e.g., smartphones)
- Wireless and mobile privacy and anonymity
- Secure localization and location privacy
- Cellular network fraud and security
- Jamming attacks and defenses
- Key management (agreement or distribution) for wireless or mobile systems
- Information-theoretic security schemes for wireless systems
- Theoretical and formal approaches for wireless and mobile security
- Cryptographic primitives for wireless and mobile security
- NFC and smart payment applications
- Security and privacy for mobile sensing systems
- Wireless or mobile security for emerging applications (e.g, privacy in health, automotive, avionics, smart grid, or IoT applications)
- Physical tracking security and privacy
- Usable mobile security and privacy
- Economics of mobile security and privacy
- Bring Your Own Device (BYOD) security
- Mobile malware and platform security
- Security for cognitive radio and dynamic spectrum access systems
- Security protocols for wireless networking
This year WiSEC introduces opinion papers and WiSec reproducibility label.
The proceedings of ACM WiSec, sponsored by SIGSAC, will be published by the ACM.
Full and Short Papers
Full paper submissions to ACM WiSec 2017 can be up to 10 pages in the ACM conference style excluding the bibliography and well marked appendices, and up to 12 pages in total. ACM WiSec also encourages the submission of short papers with a length of up to 6 pages, which describe mature work of a more succinct nature. All papers must be thoroughly anonymized for double-blind reviewing. Detailed submission instructions will appear on the conference website.
New at WiSEC 2017
ACM WiSec 2017 invites papers (ACM conference style, up to 3 pages excluding references) that present personal perspectives on all aspects of security and privacy in wireless and mobile networks. Opinion papers could also criticize previous research or research directions, as well as highlight possible promising research directions. The opinions expressed in these papers are expected to be anyway corroborated by theoretical foundations, experiments, or experiences. Like the regular papers, the opinion papers will be reviewed by the WiSec Technical Program Committee. The selected opinion papers will be a part of the WiSec technical program and will be published in the conference proceedings. Opinion papers should be submitted using the same submission procedure adopted for the full papers. The title of these papers must have the prefix “Opinion:”.
WiSEC Reproducibility Label
This year WiSec is pioneering a process to support greater reproducibility in mobile and wireless security experimental research. The goal of this process is to increase the impact of mobile and wireless research, enable dissemination of research results, sharing of code and experiments set-ups, and to enable the research community to build on prior experimental results. Towards this goal, Wisec is introducing a reproducibility label to recognize papers whose results were reproduced by an independent group of researchers. Authors of accepted papers, can participate in this voluntary process by submitting their experiments following the reproducibility evaluation instructions. Authors are encouraged to plan ahead when running their experiments to minimize the overhead of applying for this label.
Posters and Demos
WiSEC also solicits submission of posters and demos.
It is a policy of the ACM to disallow double submissions, where the same (or substantially similar) paper is concurrently submitted to multiple conferences/journals. Any double submissions detected will be immediately rejected from all conferences/journals involved.
- ACM/SIGMOBILE/SIGSAC Member (until June 6th) – $670.00
- ACM/SIGMOBILE/SIGSAC Student (until June 6th) – $670.00
- Non-Member (until June 6th) – $750.00
- Student (until June 6th) – 450.00
- ACM/SIGMOBILE/SIGSAC (June 7th – July 18th) – $800.00
- Non-Member (June 7th – July 18th) – $900.00
- Student (June 7th – July 18th) – $500.00
Silvio Micali, Turning Award Recipient, Massachusetts Institute of Technology (MIT)
Silvio Micali has received his Laurea in Mathematics from the University of Rome, and his PhD in Computer Science from the University of California at Berkeley. Since 1983 he has been on the faculty of the Electrical Engineering and Computer Science Department at the Massachusetts Institute of Technology (MIT).
Silvio’s research interests are cryptography, zero knowledge, pseudo-random generation, secure protocols, mechanism design, and distributed ledgers.
Silvio is the recipient of the Turing Award (in computer science), the Gödel Prize (in theoretical computer science), and the RSA prize (in cryptography). He is a member of the National Academy of Sciences, the National Academy of Engineering, and the American Academy of Arts and Sciences.
Srini Devadas, Webser Professor of EECS at the Massachusetts Institute of Technology (MIT)
Srini Devadas is the Webster Professor of Electrical Engineering and Computer Science at the Massachusetts Institute of Technology (MIT) where he has been on the faculty since 1988.
Devadas’s research interests span Computer-Aided Design (CAD), computer security and computer architecture.
He is a Fellow of the IEEE and ACM. He has received the 2014 IEEE Computer Society Technical Achievement award, the 2015 ACM/IEEE Richard Newton technical impact award, and the 2017 IEEE Wallace McDowell award for his research. Devadas is a MacVicar Faculty Fellow and an Everett Moore Baker teaching award recipient, considered MIT’s two highest undergraduate teaching honors.
Anand Rajan, Senior Director of the Emerging Security Lab at Intel Labs
Anand Rajan is the Senior Director of the Emerging Security Lab at Intel Labs. He leads a team of researchers whose mission is to investigate novel security features that raise the assurance of platforms across the compute continuum (Cloud to Wearables). The topics covered by his team span Trustworthy Execution Environments (TEE), IoT & Mobile Security, Cryptography, and Security for Emerging Paradigms (e.g. Autonomous Systems, 5G).
Anand is a Principal Investigator for Intel’s research collaboration with academia, government, and commercial labs on Trustworthy Platforms. He is the mentor for the Security Research Sector of Intel’s Corporate Research Council. Anand was an active member of the IEEE WG that crafted the P1363 (public-key crypto) standard. Anand and team developed the Common Data Security Architecture specification that was adopted as a worldwide standard by The Open Group. His team was also instrumental on several security standardization efforts (e.g. PKCS#11, BioAPI, UPnP-Security, & EPID).
Prior to joining Intel in 1994, Anand was technical lead for the Trusted-UNIX team at Sequent Computer Systems and worked on development and certification of a TCSEC B1-level Operating System
Dr. John L. Manferdelli, Professor of Practice, Executive Director of the Cybersecurity and Privacy Institute at Northeastern University
John Manferdelli is Professor of the Practice and Executive Director of the Cybersecurity and Privacy Institute at Northeastern University. Immediately prior to that he was Engineering Director for Production Security Development at Google.
Prior to Google, John was a Senior Principal Engineer at Intel Corporation and co-PI (with David Wagner) for the Intel Science and Technology Center for Secure Computing at the University of California at Berkeley. He was also a member of the Information Science and Technology advisory group at DARPA and is a member of the Defense Science Board
Prior to Intel, John Manferdelli was a distinguished engineer at Microsoft and was an affiliate faculty member in computer science at the University of Washington. He was responsible for computer security, cryptography and systems research, as well as research in quantum computing. At Microsoft, John also worked as a senior researcher, software architect, product unit manager, general manager at Microsoft and was responsible the development of the next-generation secure computing base technologies and the rights management capabilities currently integrated into Windows, for which he was the original architect. He joined Microsoft in February 1995 when it acquired his company, Natural Language Inc., based in Berkeley, Calif.
At Natural Language, Manferdelli was the founder and, at various times, vice president of research and development and CEO . Other positions he has held include staff engineer at TRW Inc., computer scientist and mathematician at Lawrence Livermore National Laboratory, and principal investigator at Bell Labs. He was also an adjunct associate professor at Stevens Institute of Technology.
Manferdelli’s professional interests include cryptography and cryptographic mathematics, combinatorial mathematics, operating systems, and computer security. He is author of many papers of computer security, high performance computing, cryptography, has given invited talks on high performance computing quantum computing and computer security and signal processing and has been awarded many patents. He is also a licensed Radio Amateur (AI6IT).
Manferdelli has a bachelor’s degree in physics from Cooper Union for the Advancement of Science and Art and a PhD in mathematics from the University of California, Berkeley.
Moderator: William Enck, North Carolina State University (NCSU)
Panelists: Carl Gunter, University of Illinois at Urbana-Champaign (UIUC); Panos Papadimitratos, KTH Royal Institute of Technology in Stockholm (KTH); Patrick Traynor, University of Floriday (UF); and Engin Kirda, Northeastern University (NU)
The Internet-of-Things is often lauded as a disruptive technology. While the vision of IoT requires many advancements in computing technology, the new security research challenges are not as obvious. In this panel, we will discuss IoT from a security research perspective, attempting identify what challenges have existing solutions and what still requires innovation.
Tutorial: Global Navigation Satellite Systems
Pau Closas, Northeastern University
Global Navigation Satellite Systems (GNSS) is the technology of choice for most position-related applications, when it is available. A GNSS receiver relies on a constellation of satellites to estimate a set of range measures from which to compute its position. These distances are calculated estimating the propagation time that transmitted signals take from each satellite to the receiver. The term GNSS encompasses GPS, Galileo, GLONASS, or Beidou systems among others. The main challenges of GNSS technology arise when operating in complex environments which are either naturally impaired by multipath, shadowing, high dynamics, or ionospheric scintillation; or intentionally/unintentionally interfered. In the last decade, ushered by an ever increasing demand for availability, accuracy, and reliability, the mitigation of these challenges has steered intense research on advanced receiver design. The main goal of this tutorial is to introduce the GNSS landscape and, motivated by its widespread use, highlight the need for securing and protecting GNSS infrastructure. The main threats and sources of interferences are classified, along with their impact on various stages of a GNSS receiver. Finally, the tutorial will conclude with an overview of the GNSS-SDR project (gnss-sdr.org), a free and open-source software implementing an end-to-end GNSS receiver.
WiSEC 2017 will be hosted at Northeastern University in the Interdisciplinary Science and Engineering Complex (ISEC) building, home to NU Security and Privacy Institute. The talks will be in the Auditorium of the ISEC building which is located at 805 Columbus Ave, Boston, MA 02120.
Student Travel Grants
WiSEC encourages graduate students to participate in the conference by partially subsidizing travel costs up to $1,000 of those who would otherwise be unable to attend. The travel grants are provided by NSF and ACM.
This year WiSec is pioneering a process to support greater reproducibility in mobile and wireless security experimental research. The goal of this process is to increase the impact of mobile and wireless security research, enable dissemination of research results, code and experimental set-ups, and to enable the research community to build on prior experimental results. Towards this goal, WiSec is introducing a reproducibility label to recognize papers whose results were reproduced by an independent reproducibility committee. Authors of accepted papers can participate in this voluntary process by submitting supporting evidence of their experiments’ reproducibility, following the instructions below. Authors are encouraged to plan ahead when running their experiments, in order to minimize the overhead of applying for this label.
In this first iteration, the authors will:
- Prepare a VirtualBox VM with all data/tools installed. It is expected that the authors include within this VM raw data (without any pre-processing) and all the scripts used for pre-processing.
- For each graph/table, provide a directory (Fig_XXX, Table_XXX) which contains a script that enables the committee to regenerate that object.
- Include in the home directory a readme file, according to the following format. The authors can use the following script to generate information about the configuration of the machine that was used for the experiments.
- Provide a link to downloading the VM (e..g, google drive or dropbox), or request credentials to upload the VM to the conference storage system.
- Submit a request on easychair (https://easychair.org/conferences/?conf=wisec17reproducibili) and include a link within the abstract to your VM.
Deadline: June 2, 2017
If the committee can verify that all relevant data sets were included and the graphs/tables can be regenerated based on this, the committee will grant a Reproducibility Label and also provide a report on the regeneration process.
- Guevara Noubir (Chair), Northeastern University
- Paul Patras, University of Edinburgh
- Aanjhan Ranganathan, ETH Zürich
- Triet Vo-Huu, Northeastern University
ACM WiSEC Harassment Policy
The open exchange of ideas and the freedom of thought and expression are central to the aims and goals of the ACM, and of academic research in general. These require an environment that recognizes the inherent worth of every person and group, that fosters dignity, understanding, and mutual respect, and that embraces diversity. The ACM Code of Ethics embraces the “values of equality, tolerance, respect for others, and the principles of equal justice.” For these reasons, WiSec is dedicated to providing a harassment-free conference experience.
Harassment is unwelcome or hostile behavior, including speech that intimidates, creates discomfort, or interferes with a person’s participation or opportunity for participation, in an ACM event. Harassment in any form, including but not limited to harassment based on race, gender, religion, age, color, national origin, ancestry, disability, sexual orientation, or gender identity, will not be tolerated. Harassment includes the use of gratuitous language or sexual imagery in public presentations and displays, degrading verbal comments, deliberate intimidation, stalking, harassing photography or recording, inappropriate physical contact, and unwelcome sexual attention.
Conference participants violating these standards may be sanctioned, expelled from the conference or asked not to attend future conferences or conference events, at the discretion of the conference organizers and ACM.
The official anti-harassment policy adopted by the ACM can be found here.