2023
DOI: 10.1016/j.cose.2023.103127
|View full text |Cite
|
Sign up to set email alerts
|

A systematic threat analysis and defense strategies for the metaverse and extended reality systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 72 publications
(19 citation statements)
references
References 43 publications
0
19
0
Order By: Relevance
“…Although the exploration and development of metaverse is still in the infancy phase, some works on metaverse [8,9] have already been proposed. Additionally, several works [10][11][12][13][14] have discussed security and privacy issues in the metaverse. As relevant technologies are deeply explored, research on the metaverse has involved multiple areas.…”
Section: Related Workmentioning
confidence: 99%
“…Although the exploration and development of metaverse is still in the infancy phase, some works on metaverse [8,9] have already been proposed. Additionally, several works [10][11][12][13][14] have discussed security and privacy issues in the metaverse. As relevant technologies are deeply explored, research on the metaverse has involved multiple areas.…”
Section: Related Workmentioning
confidence: 99%
“…The management of risk within information systems is a pivotal process that necessitates the identification, quantification, assessment, and mitigation of risks associated with the deployment of such systems within an organization [14]. An analysis is undertaken with the aim of pinpointing potential threats [15] and identifying inherent vulnerabilities in the existing information systems. Subsequently, it is the goal to devise suitable preventive or mitigation measures [16,17].…”
Section: Risk Management Analysismentioning
confidence: 99%
“…The development and research of metaverse involve many areas, and some papers have outlined the key technologies related to metaverse 1,4 , such as extended reality 5 , blockchain [6][7][8] , artificial intelligence 9,10 , and 5G technology 11 . Several papers have introduced research on metaverse security and privacy [12][13][14][15][16] . Wang et al have introduced the security vulnerability and countermeasures of metaverse from several aspects such as authentication and authorization, access control, data management, privacy threats, network, society, and governance 17 .…”
Section: Related Workmentioning
confidence: 99%