The metaverse: Survey, trends, novel pipeline ecosystem & future directions
The Metaverse offers a second world beyond reality, where boundaries are non-existent,
and possibilities are endless through engagement and immersive experiences using the …
and possibilities are endless through engagement and immersive experiences using the …
Virtually secure: A taxonomic assessment of cybersecurity challenges in virtual reality environments
Abstract Although Virtual Reality (VR) is certainly not a new technology, its recent adoption
across several sectors beyond entertainment has led the information security research …
across several sectors beyond entertainment has led the information security research …
Sok: Authentication in augmented and virtual reality
Augmented reality (AR) and virtual reality (VR) devices are emerging as prominent
contenders to today's personal computers. As personal devices, users will use AR and VR to …
contenders to today's personal computers. As personal devices, users will use AR and VR to …
Fast and secure authentication in virtual reality using coordinated 3d manipulation and pointing
There is a growing need for usable and secure authentication in immersive virtual reality
(VR). Established concepts (eg, 2D authentication schemes) are vulnerable to observation …
(VR). Established concepts (eg, 2D authentication schemes) are vulnerable to observation …
Security and privacy in virtual reality: a literature survey
A Giaretta - Virtual Reality, 2024 - Springer
Virtual reality (VR) is a multibillionaire market that keeps growing, year after year. As VR is
becoming prevalent in households and small businesses, it is critical to address the effects …
becoming prevalent in households and small businesses, it is critical to address the effects …
Privacy leakage via unrestricted motion-position sensors in the age of virtual reality: A study of snoo** typed input on virtual keyboards
Virtual Reality (VR) has gained popularity in numerous fields, including gaming, social
interactions, shop**, and education. In this paper, we conduct a comprehensive study to …
interactions, shop**, and education. In this paper, we conduct a comprehensive study to …
[PDF][PDF] Eavesdrop** on controller acoustic emanation for keystroke inference attack in virtual reality
Understanding the vulnerability of virtual reality (VR) is crucial for protecting sensitive data
and building user trust in VR ecosystems. Previous attacks have demonstrated the feasibility …
and building user trust in VR ecosystems. Previous attacks have demonstrated the feasibility …
Combining real-world constraints on user behavior with deep neural networks for virtual reality (vr) biometrics
Deep networks have demonstrated enormous potential for identification and authentication
using behavioral biometrics in virtual reality (VR). However, existing VR behavioral …
using behavioral biometrics in virtual reality (VR). However, existing VR behavioral …
Knowledge-driven biometric authentication in virtual reality
With the increasing adoption of virtual reality (VR) in public spaces, protecting users from
observation attacks is becoming essential to prevent attackers from accessing context …
observation attacks is becoming essential to prevent attackers from accessing context …
Rubikauth: Fast and secure authentication in virtual reality
There is a growing need for usable and secure authentication in virtual reality (VR).
Established concepts (eg, 2D graphical PINs) are vulnerable to observation attacks, and …
Established concepts (eg, 2D graphical PINs) are vulnerable to observation attacks, and …