Using External Video to Attack Behavior-Based Security Mechanisms in Virtual Reality (VR)

被引:2
|
作者
Miller, Robert [1 ]
Banerjee, Natasha Kholgade [1 ]
Banerjee, Sean [1 ]
机构
[1] Clarkson Univ, Potsdam, NY 13699 USA
关键词
Human-centered computing; Human computer interaction (HCI); Interaction paradigms; Virtual reality; Security and privacy; Security services; Authentication; Biometrics;
D O I
10.1109/VRW55335.2022.00193
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As virtual reality (VR) systems become prevalent in domains such as healthcare and education, sensitive data must be protected from attacks. Password-based techniques are circumvented once an attacker gains access to the user's credentials. Behavior-based approaches are susceptible to attacks from malicious users who mimic the actions of a genuine user or gain access to the 3D trajectories. We investigate a novel attack where a malicious user obtains a 2D video of genuine user interacting in VR. We demonstrate that an attacker can extract 2D motion trajectories from the video and match them to 3D enrollment trajectories to defeat behavior-based VR security.
引用
收藏
页码:675 / 676
页数:2
相关论文
共 50 条
  • [1] Paralympic VR Game Immersive Game using Virtual Reality and Video
    Macedo, Raquel
    Correia, Nuno
    Romao, Teresa
    [J]. CHI EA '19 EXTENDED ABSTRACTS: EXTENDED ABSTRACTS OF THE 2019 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2019,
  • [2] Realtime Behavior-Based Continual Authentication of Users in Virtual Reality Environments
    Miller, Robert
    Ajit, Ashwin
    Banerjee, Natasha Kholgade
    Banerjee, Sean
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND VIRTUAL REALITY (AIVR), 2019, : 253 - 254
  • [3] Smartphone Security Using Swipe Behavior-based Authentication
    Ali, Adnan Bin Amanat
    Ponnusamy, Vasaki
    Sangodiah, Anbuselvan
    Alroobaea, Roobaea
    Jhanjhi, N. Z.
    Ghosh, Uttam
    Masud, Mehedi
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2021, 29 (02): : 571 - 585
  • [4] Understanding Shoulder Surfer Behavior and Attack Patterns Using Virtual Reality
    Abdrabou, Yasmeen
    Rivu, Radiah
    Ammar, Tarek
    Liebers, Jonathan
    Saad, Alia
    Liebers, Carina
    Gruenefeld, Uwe
    Knierim, Pascal
    Khamis, Mohamed
    Makela, Ville
    Schneegass, Stefan
    Alt, Florian
    [J]. PROCEEDINGS OF THE WORKING CONFERENCE ON ADVANCED VISUAL INTERFACES AVI 2022, 2022,
  • [5] A Behavior-based Buffer Overflow Attack Blocker
    章力源
    [J]. 电脑知识与技术, 2010, 6 (10) : 2544 - 2549
  • [6] VIRTUAL REALITY FOR HEALTH BEHAVIOR MEASUREMENT: THE VR BUFFET
    Persky, Susan
    [J]. ANNALS OF BEHAVIORAL MEDICINE, 2018, 52 : S663 - S663
  • [7] Behavior-based Popularity Ranking on Amazon Video
    Ramachandran, Lakshmi
    [J]. RECSYS 2020: 14TH ACM CONFERENCE ON RECOMMENDER SYSTEMS, 2020, : 564 - 565
  • [8] Behavior-based network security goes mainstream
    Geer, D
    [J]. COMPUTER, 2006, 39 (03) : 14 - 17
  • [9] Behavior-Based Detection for Malicious Script-Based Attack
    Yoon, Soojin
    Choo, Hyun-lock
    Bae, Hanchul
    Kim, Hwankuk
    [J]. ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2017, 421 : 97 - 103
  • [10] Within-System and Cross-System Behavior-Based Biometric Authentication in Virtual Reality
    Miller, Robert
    Banerjee, Natasha Kholgade
    Banerjee, Sean
    [J]. 2020 IEEE CONFERENCE ON VIRTUAL REALITY AND 3D USER INTERFACES WORKSHOPS (VRW 2020), 2020, : 311 - 316