The Big Brother's New Playground: Unmasking the Illusion of Privacy in Web Metaverses from a Malicious User's Perspective DOI Creative Commons
Andrea Mengascini,

Ryan Aurelio,

Giancarlo Pellegrino

и другие.

Опубликована: Дек. 2, 2024

Metaverses are virtual worlds where users can engage in social exchanges, collaborate, or play games. Their clients now JavaScript programs that run inside modern web browsers. They implement functionalities typical of multiplayer video games, like 3D and physics engines, requiring them to maintain complex data structures objects the browser's memory. Unfortunately, these be accessed manipulated by malicious users, allowing learn about events beyond ones rendered on screen hijack metaverse spy other users.In this paper, we propose one first comprehensive security assessments for platforms. We begin with a survey selection three platforms introduce software-centric threat modeling approach designed identify security-relevant entities. Then, global object snapshot diffing technique in-memory correlated attribute design 10 attacks, which eight successfully executed against at least metaverses, enabling user perform audio/video surveillance continuous position tracking - mention few who could exacerbate current threats posed stalkers online abusers. Finally, discuss implications our attacks should become business tool possible solutions.

Язык: Английский

Six provocations for metaverse datafication: an emergent cultural, technological, and scholarly phenomenon DOI Creative Commons
Chris Hesselbein, Paolo Bory, Stefano Canali

и другие.

Information Communication & Society, Год журнала: 2024, Номер unknown, С. 1 - 19

Опубликована: Дек. 9, 2024

Although the 'metaverse' is still feverish pipedream of tech companies and venture capitalists, it also a powerful imaginary for channelling enormous resources towards deepening extending ongoing processes digitalization datafication. It thus likely that an increasing amount human activity – both professional as well leisure-related will take place in metaversal spaces, paradigm 'Big Data' about to be expanded with massive amounts new varied or multimodal data capture even more (corporeal, sensorial, spatial, temporal) information produced by people their interactions these unfold (mixed) spaces over time. Much like rise big data, emergence gives important tensions issues. From perspective critical studies, media science technology this paper spotlights role obtained about, in, through metaverse technologies environments how can understood intensification extension datafication social life, quantification research methodologies, exacerbation inequality. We discuss issues series six provocations each address distinct tension between production knowledge, various are central contemporary societies.

Язык: Английский

Процитировано

1

Responsible AI DOI

Prathmesh Singh,

Arnav Upadhyaya,

Nripendra Singh

и другие.

Advances in social networking and online communities book series, Год журнала: 2024, Номер unknown, С. 44 - 57

Опубликована: Фев. 26, 2024

Metaverse uses artificial intelligence and machine learning along with augmented reality to create immersive digital experiences where users can interact other computer-generated environments. This creates new ways for people connect, collaborate, experience content, opens up exciting possibilities. It also interesting questions on the responsible use of AI. chapter will explore what mechanisms frameworks should be evaluated AI- which allows humanity enjoy benefits AI platforms like metaverse.

Язык: Английский

Процитировано

0

Cyber Security and Privacy Issues in Extended Reality Healthcare Applications: Scoping Review (Preprint) DOI
Kaitlyn Lake, Andrea Mc Kittrick, Mathilde R. Desselle

и другие.

Опубликована: Апрель 12, 2024

BACKGROUND Virtual reality (VR) is a type of extended (XR) technology increasingly used by rehabilitation practitioners to support following illness or injury that affect the upper limbs. There robust evidence articulating how consumer-grade VR presents significant cyber security implications, such as and privacy risks with software hardware interfaces use cameras. However, little known about these translate in systems healthcare settings. The objective this review identify associated clinical systems, develop guidance for health informatics safe healthcare. OBJECTIVE This scoping aims XR technologies components, including threats, attacks attackers, focus on VR. Furthermore, we aim understand can be mitigated environment, particular understanding unique concerns setting identifying relevant technologies, frameworks strategies mitigate risks. METHODS A literature performed one database (Google Scholar) identified 482 articles from years 2017 2024. After abstract screening, 53 studies were extracted full text review, which 29 included analysis. followed PRISMA extension Scoping Reviews, publications reviewed using Covidence software. Data technology, threats risk mitigation extracted. RESULTS Of studies, 79% published between 2020 2023, 55% focused majority threat strategy both (26 papers, 90%). 90% components investigated head-mounted display (HMD) devices greatest was information disclosure (76%). Risk mapped against National Institute Standards Technology (NIST) Cybersecurity Framework, where 62% preventative (18/29). least established function recovery after incident, only potential strategy. CONCLUSIONS Findings an enterprise management (ERM) model contextualise organisations. most posited system disclose personal data medical related may inferred, immersive manipulation impact user safety. Many all types but none have been implemented beyond proof-of-concept. None mitigations studied context, requires further research.

Язык: Английский

Процитировано

0

The Metaverse: Privacy and Information Security Risks DOI

Laiz-Ibanez Hector,

Cristina Mendaña Cuervo,

Carus-Candas Juan Luis

и другие.

Опубликована: Янв. 1, 2024

Download This Paper Open PDF in Browser Add to My Library Share: Permalink Using these links will ensure access this page indefinitely Copy URL DOI

Язык: Английский

Процитировано

0

Improving QoE-Privacy Tradeoff in XR Streaming DOI
Xing Wei, Cornelius Hellge, Chenyang Yang

и другие.

IEEE Signal Processing Letters, Год журнала: 2024, Номер 31, С. 1504 - 1508

Опубликована: Янв. 1, 2024

Язык: Английский

Процитировано

0

Effect of Duration and Delay on the Identifiability of VR Motion DOI
Mark Roman Miller, Vivek Nair, Eugy Han

и другие.

Опубликована: Июнь 4, 2024

Social virtual reality is an emerging medium of communication. In this medium, a user's avatar (virtual representation) controlled by the tracked motion headset and hand controllers. This rich data stream that can leak characteristics user or be effectively matched to previously-identified identify user. To better understand boundaries identifiability, we investigate how varying training duration train-test delay affects accuracy at which machine learning model correctly classify in supervised task simulating re-identification. The dataset use has unique combination large number participants, long per session, sessions, time span over sessions were conducted. We find affect identifiability; minimal leads very high accuracy; should future experiments.

Язык: Английский

Процитировано

0

Effect of Data Degradation on Motion Re-Identification DOI
Vivek Nair, Mark Roman Miller, Rui Wang

и другие.

Опубликована: Июнь 4, 2024

The use of virtual and augmented reality devices is increasing, but these sensor-rich pose risks to privacy. ability track a user's motion infer the identity or characteristics user poses privacy risk that has received significant attention. Existing deep-network-based defenses against this risk, however, require amounts training data have not yet been shown generalize beyond specific applications. In work, we study effect signal degradation on identifiability, specifically through added noise, reduced framerate, precision, dimensionality data. Our experiment shows state-of-the-art identification attacks still achieve near-perfect accuracy for each degradations. This negative result demonstrates difficulty anonymizing gives some justification existing data- compute-intensive deep-network based methods.

Язык: Английский

Процитировано

0

Ethical Considerations in the Production and Consumption of Music in the Metaverse DOI
Gareth W. Young

Опубликована: Сен. 30, 2024

Volumetric music videos (VMVs) transform immersive entertainment to create 3D musical performances using volumetric video technology. These videos, accessible via 2D screens or extended reality (XR) platforms, offer novel interactive experiences in the interconnected worlds of Metaverse. As VMVs rapidly integrate into virtual environments (IVEs), they raise critical ethical concerns about data privacy, content authenticity, and user well-being. Here, we show that addressing these issues is crucial for responsible development VMVs. We present a survey-based analysis where first identify key guidelines through an extensive literature review. then apply emerging domain Musical Metaverse, particularly focusing on XR IVEs. Our findings reveal robust privacy protection, accurate representation, inclusive design are essential safeguard rights promote positive experience. This study builds upon previous work highlights need industry-wide standards collaborative efforts ensure practices VMV production consumption, fostering trust sustainability emergent

Язык: Английский

Процитировано

0

The Big Brother's New Playground: Unmasking the Illusion of Privacy in Web Metaverses from a Malicious User's Perspective DOI Creative Commons
Andrea Mengascini,

Ryan Aurelio,

Giancarlo Pellegrino

и другие.

Опубликована: Дек. 2, 2024

Metaverses are virtual worlds where users can engage in social exchanges, collaborate, or play games. Their clients now JavaScript programs that run inside modern web browsers. They implement functionalities typical of multiplayer video games, like 3D and physics engines, requiring them to maintain complex data structures objects the browser's memory. Unfortunately, these be accessed manipulated by malicious users, allowing learn about events beyond ones rendered on screen hijack metaverse spy other users.In this paper, we propose one first comprehensive security assessments for platforms. We begin with a survey selection three platforms introduce software-centric threat modeling approach designed identify security-relevant entities. Then, global object snapshot diffing technique in-memory correlated attribute design 10 attacks, which eight successfully executed against at least metaverses, enabling user perform audio/video surveillance continuous position tracking - mention few who could exacerbate current threats posed stalkers online abusers. Finally, discuss implications our attacks should become business tool possible solutions.

Язык: Английский

Процитировано

0