4.6 Article

Immersive Virtual Reality Attacks and the Human Joystick

Journal

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TDSC.2019.2907942

Keywords

Security; Virtual reality; Software; Tracking; Cameras; Testing; Resists; Computer security; human computer interaction; privacy-invasive software; virtual reality

Funding

  1. National Science Foundation [1748950]
  2. Division Of Graduate Education
  3. Direct For Education and Human Resources [1748950] Funding Source: National Science Foundation

Ask authors/readers for more resources

This study presents a security analysis of consumer immersive Virtual Reality (VR) systems, creating new attacks and demonstrating the success of exploiting VR systems to control immersed users through a human participant deception study. Future research directions and ways to enhance the security of these systems are also discussed.
This is one of the first accounts for the security analysis of consumer immersive Virtual Reality (VR) systems. This work breaks new ground, coins new terms, and constructs proof of concept implementations of attacks related to immersive VR. Our work used the two most widely adopted immersive VR systems, the HTC Vive, and the Oculus Rift. More specifically, we were able to create attacks that can potentially disorient users, turn their Head Mounted Display (HMD) camera on without their knowledge, overlay images in their field of vision, and modify VR environmental factors that force them into hitting physical objects and walls. Finally, we illustrate through a human participant deception study the success of being able to exploit VR systems to control immersed users and move them to a location in physical space without their knowledge. We term this the Human Joystick Attack. We conclude our work with future research directions and ways to enhance the security of these systems.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available