Important Dates
Paper Submission Deadline | 30th June 2025 |
Notification to authors | 10th August 2025 |
Camera-ready versions | 25th August 2025 |
Note: all deadlines are Anywhere On Earth (AOE) time
The rapid proliferation of Internet of Things (IoT) devices and mobile technologies has radically reshaped modern computing, introducing both significant opportunities and critical security challenges. IoT systems are now deeply embedded in smart homes, industrial control systems, healthcare, and critical infrastructure, making them attractive targets for cyberattacks that exploit insecure communication protocols, firmware vulnerabilities, and misconfigured devices. At the same time, mobile devices, powered by platforms such as Android and iOS, have become central to personal and enterprise security, handling sensitive data, authentication, and financial transactions. As these devices increasingly serve as gateways to digital identities and critical services, securing apps, payment systems, authentication mechanisms, and enterprise mobile management solutions has become a pressing concern.
The MIST workshop will explore the latest advancements in IoT and mobile security, focusing on the peculiar vulnerabilities and threats these systems face. Additionally, it will address how generative AI and Large Language Models are influencing this space. These emerging technologies have the potential to enhance security by automating threat detection, vulnerability analysis, and response strategies. However, they also introduce new challenges, as they can be leveraged by attackers to craft sophisticated cyberattacks, bypass existing defenses, and exploit IoT and mobile system vulnerabilities.
The goal of the MIST workshop is to bring together researchers and practitioners to discuss the evolving security landscape of IoT and mobile systems. The workshop welcomes contributions on a broad range of topics related to securing these technologies, including novel attack vectors, defense mechanisms, risk assessments, and real-world case studies. In particular, we encourage discussions on the impact of generative AI and Large Language Models, both as tools for strengthening cybersecurity and as potential enablers of new attack strategies. This discussion will highlight the complexities and opportunities of integrating AI-driven solutions into security frameworks, with a particular focus on the implications these technologies have for the future of IoT and mobile system protection.
We invite submissions of original research papers on topics related to IoT and mobile security. Possible topics include, but are not limited to:
- Malware for IoT or mobile devices
- GenAI and LLMs for IoT and mobile security
- Supply-chain attacks
- IoT security and privacy
- IoT software similarity analysis
- Android and iOS security and privacy
- Adversarial learning for IoT and mobile security
- Intrusion detection and prevention for IoT
- Mobile application security and digital forensics
- IoT Hardware security
- Cyber physical systems security
- Cryptography for IoT and mobile
- Mobile user authentication and authorization
Submission guidelines
All accepted papers will be published in the Springer LNCS series.
Submitted papers must not substantially overlap with previously published or currently under review papers for journals or conferences. The only accepted format for submission is pdf. Submitted papers must follow the LNCS template from the time they are submitted. Submitted papers should be at most 16 pages (using 10-point font), excluding the bibliography and well-marked appendices, and at most 20 pages total. Committee members are not required to read the appendices, so the paper should be intelligible without them. All submissions must be written in English. Failure to comply with these guidelines may lead to rejection without considering the content’s quality. If accepted, authors must agree to the Springer LNCS copyright and present their papers at the workshop.
Submission site: https://easychair.org/conferences/?conf=esorics2025