Proceedings

Accepted Position Papers

Security and Privacy for Augmented Reality: Our 10-Year Retrospective
Franziska Roesner and Tadayoshi Kohno
Preview. Almost exactly 10 years ago, in May 2011, we submitted our first paper on security and privacy for emerging augmented reality (AR) systems [15], to the 2011 USENIX Workshop on Hot Topics in Security (HotSec). Though the paper was rejected — a revised version later appearing as the cover article of the Communications of the ACM magazine in April 201 — it launched us on a now 10-year research trajectory anticipating, studying, and designing to mitigate security, privacy, and safety issues in AR (and/or in MR, XR, VR)...
Download PDF
Detecting Framerate-Oriented Cyber Attacks On User Experience in Virtual Reality
Blessing Odeleye, George Loukas, Ryan Heartfield and Fotios Spyridonis
Preview. Virtual Reality (VR) is expected to become an enabling technology for training in realistic conditions, data visualisation, education and many other applications. However, there is still limited research on cyber threats to VR environments and even less on technical protections against them. We are currently developing a VR testbed specifically designed for assessing different cyber threats, their impact to user experience and corresponding defences. In this work in progress, we demonstrate two novel approaches by which a cyber attack can potentially cause VR sickness on demand...
Download PDF
Designing Privacy-Informed Sharing Techniques for Multi-User AR Experiences
Shwetha Rajaram, Franziska Roesner and Michael Nebeling
Preview. With recent augmented reality (AR) systems becoming more prevalent and collaborative, there is an increased need for AR interaction techniques to mitigate the unique privacy concerns with multi-user, always-on AR. We present a study design based on two multi-user AR scenarios which expands on user-driven elicitation as a popular method in HCI by pairing AR and privacy experts together to iteratively design interactions and analyze corresponding privacy threats...
Download PDF
Let’s SOUP up XR: Collected Thoughts From an IEEE VR Workshop on Privacy in Mixed Reality
Brendan David-John, Diane Hosfelt, Kevin Butler and Eakta Jain
Preview. This paper presents insights from the PrXR workshop conducted at IEEE VR 2021. We identified several topic areas related to privacy and security risks for virtual, augmented, and mixed-reality (XR) applications. Risks are presented from the perspective of the XR community. We attempt to thematically group the workshop findings and highlight the challenges brought up by the participants...
Download PDF
Safety and Security Challenges for Collaborative Robotics in VR
Soroosh Mortezapoor and Khrystyna Vasylevska
Preview. Virtual reality (VR) security and privacy are not limited to existing software solutions and applications. In this article, we present to the community the challenges of VR systems with robot integration. Integrating robots under ROS poses a massive risk in terms of data security. At the same time, using a robot for simulations in VR requires, first and foremost, the user’s safety - hence redundant data collection and sharing...
Download PDF
CyberCopter: A 3D Helical Visualisation for Periodic Signals of Cyber Attacks
Nicolas Delcombel, Alexandre Kabil, Thierry Duval and Marc-Oliver Pahl
Preview. This paper aims to asses the usefulness of 3D interactive interfaces to display periodic signals in a network. Past research has shown that 2D data visualization simplifies alerts classification. Including those drawn by periodicity based Intrusion Detection Systems. However, 2D visualisations have limitations such as screen space availability. This is why we created CyberCopter, a prototype that uses a 3D helical representation to highlight periodic patterns in a dataset...
Download PDF

Accepted Research Statements

Disturbing the Sense of Balance Using Redirection Illusions in Virtual Reality
Wen-Jie Tseng, Elise Bonnail, Samuel Huron, Eric Lecolinet and Jan Gugenheimer
Preview. Research in Virtual Reality (VR) and Human-Computer Interaction (HCI) has leveraged human’s perceptual abilities to induce VR illusions — an imperceptible manipulation on the user’s body motions that dominantly aims for positive purposes. For example, providing haptic feedback [1], enhancing presence [4], and improving ergonomics in VR [3]. However, this technological paradigm often fails to consider its potential for malicious design...
Download PDF
Studying the Privacy and Security Risks of XR Advertising -- Research Statement for the VR4Sec2021 Workshop
Abraham Mhaidli
Preview. As extended reality (XR) devices become mainstream, so will XR advertising. XR advertising will offer numerous ways for businesses to interact with consumers. However, it also poses novel consumer risks, including possible privacy violations for consumers. We know from online advertising that advertisers strive to collect vast quantities of user data to profile users and target ads...
Download PDF
A Virtual Environment to Prototype and Analyse Operator Support in CCTV Surveillance Rooms
Jamil Joundi
Preview. Operators in closed-circuit television (CCTV) control rooms have to monitor large sets of video feeds coming from an ever increasing number of cameras. To assist these operators in their demanding day-to-day tasks, AI-driven support systems accompanied by user-centric interfaces are being developed. However, prototyping these support systems...
Download PDF
Communicating Security & Privacy Information in Virtual Reality
Melvin Abraham and Mohamed Khamis
Preview. Virtual Reality is becoming more affordable and will soon become ubiquitous within society. However, currently the technology is not there yet, as virtual reality can pose security and privacy risks to a user which they may not be aware of. In Virtual Reality, information is always being collected, even when the user may believe the headset is turned off [1,2]...
Download PDF
Training and Data Analysis use cases for Cybersecurity through Mixed Reality Applications
Alexandre Kabil, Thierry Duval and Marc-Oliver Pahl
Preview. In this paper, we will discuss our point of view of the use of Mixed Environments for Cybersecurity, especially for training and data analysis purposes. We will argue that Collaborative Mixed Environments could merge training and analysis approaches by providing users several points of view on cyber situations....
Download PDF

Important Dates

May 27, 2021
Submission Deadline
June 10, 2021
Extended Submission Deadline
June 11/21, 2021
Acceptance Notification
June 24/30, 2021
Final papers due
August 6, 2021
Day of Workshop
3pm CEST
Time of Workshop