2023
DOI: 10.1016/j.cose.2022.102923
|View full text |Cite
|
Sign up to set email alerts
|

Rise of the Metaverse’s Immersive Virtual Reality Malware and the Man-in-the-Room Attack & Defenses

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 34 publications
(13 citation statements)
references
References 12 publications
0
8
0
Order By: Relevance
“…Method. From the 68 selected studies, we identified 5 studies that proposed a VR information flow [37], [84], [25], [137], [46] and 21 with an explicit discussion or proposal for VR defense and (predominantly) threat models [28], [116], [26], [37], [84], [64], [55], [27], [29], [65], [56], [123], [42], [58], [113], [30], [134], [112], [95], [67], [6]. Two researchers extracted, discussed, and combined the associated artifacts, resulting in a holistic VR information flow that frames our threat and defense models.…”
Section: Vr Threat and Defense Modelsmentioning
confidence: 99%
“…Method. From the 68 selected studies, we identified 5 studies that proposed a VR information flow [37], [84], [25], [137], [46] and 21 with an explicit discussion or proposal for VR defense and (predominantly) threat models [28], [116], [26], [37], [84], [64], [55], [27], [29], [65], [56], [123], [42], [58], [113], [30], [134], [112], [95], [67], [6]. Two researchers extracted, discussed, and combined the associated artifacts, resulting in a holistic VR information flow that frames our threat and defense models.…”
Section: Vr Threat and Defense Modelsmentioning
confidence: 99%
“…They also found that attacks such as Man-In-The-Middle (MITM) were plausible due to the lack of encryption, where an attacker can potentially inject themselves into a private room in the virtual world without the need for further authentication. In addition, Vondrek et al [ 49 ] also demonstrated how malware could be used to conduct man-in-the-room attacks in VR systems.…”
Section: Visualization and Cybersecurity Issuesmentioning
confidence: 99%
“…They developed a tool for analyzing memory dumps from a VR system and showed that various pieces of information can be extracted from the memory dumps as potential sources of digital evidence. In addition, the use of forensics of immersive VR systems can also reveal vulnerabilities in the system that an adversary can exploit [ 48 , 49 ]. This will be useful for developers to facilitate the design of security mechanisms to safeguard their systems.…”
Section: Countermeasuresmentioning
confidence: 99%
See 1 more Smart Citation
“…If the desired behavior is to assign the input data item to one category among several, this is a classification task, e.g., object recognition. Other examples of tasks are machine translation, transcription, anomaly detection, etc [18] [19].…”
Section: Machine Learningmentioning
confidence: 99%