The metaverse: Survey, trends, novel pipeline ecosystem & future directions

H Sami, A Hammoud, M Arafeh… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
The Metaverse offers a second world beyond reality, where boundaries are non-existent,
and possibilities are endless through engagement and immersive experiences using the …

Virtually secure: A taxonomic assessment of cybersecurity challenges in virtual reality environments

B Odeleye, G Loukas, R Heartfield, G Sakellari… - Computers & …, 2023 - Elsevier
Abstract Although Virtual Reality (VR) is certainly not a new technology, its recent adoption
across several sectors beyond entertainment has led the information security research …

Sok: Authentication in augmented and virtual reality

S Stephenson, B Pal, S Fan… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Augmented reality (AR) and virtual reality (VR) devices are emerging as prominent
contenders to today's personal computers. As personal devices, users will use AR and VR to …

Fast and secure authentication in virtual reality using coordinated 3d manipulation and pointing

F Mathis, JH Williamson, K Vaniea… - ACM Transactions on …, 2021 - dl.acm.org
There is a growing need for usable and secure authentication in immersive virtual reality
(VR). Established concepts (eg, 2D authentication schemes) are vulnerable to observation …

Security and privacy in virtual reality: a literature survey

A Giaretta - Virtual Reality, 2024 - Springer
Virtual reality (VR) is a multibillionaire market that keeps growing, year after year. As VR is
becoming prevalent in households and small businesses, it is critical to address the effects …

Privacy leakage via unrestricted motion-position sensors in the age of virtual reality: A study of snoo** typed input on virtual keyboards

Y Wu, C Shi, T Zhang, P Walker, J Liu… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Virtual Reality (VR) has gained popularity in numerous fields, including gaming, social
interactions, shop**, and education. In this paper, we conduct a comprehensive study to …

[PDF][PDF] Eavesdrop** on controller acoustic emanation for keystroke inference attack in virtual reality

S Luo, A Nguyen, H Farooq, K Sun… - The Network and …, 2024 - ndss-symposium.org
Understanding the vulnerability of virtual reality (VR) is crucial for protecting sensitive data
and building user trust in VR ecosystems. Previous attacks have demonstrated the feasibility …

Combining real-world constraints on user behavior with deep neural networks for virtual reality (vr) biometrics

R Miller, NK Banerjee… - 2022 IEEE Conference on …, 2022 - ieeexplore.ieee.org
Deep networks have demonstrated enormous potential for identification and authentication
using behavioral biometrics in virtual reality (VR). However, existing VR behavioral …

Knowledge-driven biometric authentication in virtual reality

F Mathis, HI Fawaz, M Khamis - Extended Abstracts of the 2020 CHI …, 2020 - dl.acm.org
With the increasing adoption of virtual reality (VR) in public spaces, protecting users from
observation attacks is becoming essential to prevent attackers from accessing context …

Rubikauth: Fast and secure authentication in virtual reality

F Mathis, J Williamson, K Vaniea… - Extended Abstracts of the …, 2020 - dl.acm.org
There is a growing need for usable and secure authentication in virtual reality (VR).
Established concepts (eg, 2D graphical PINs) are vulnerable to observation attacks, and …