{"id":574,"date":"2020-11-09T10:00:00","date_gmt":"2020-11-09T10:00:00","guid":{"rendered":"https:\/\/tagowill.com\/Portfolio\/?post_type=portfolio_xion&#038;p=574"},"modified":"2022-07-18T12:25:20","modified_gmt":"2022-07-18T12:25:20","slug":"award-winning-duaxrtbs","status":"publish","type":"portfolio_xion","link":"https:\/\/tagowill.com\/portfolio\/title\/award-winning-duaxrtbs\/","title":{"rendered":"[Award-winning] Discerning User Activity in XR Through Biometric Side-Channels"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"574\" class=\"elementor elementor-574\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-40a5bd74 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"40a5bd74\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-350e63a1\" data-id=\"350e63a1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-74805b54 elementor-widget elementor-widget-text-editor\" data-id=\"74805b54\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>I wrote this scientific paper with Jonathan Roscoe and Max Smith-Creasey. In this early work, we aim to highlight an important issue for those seeking to utilise XR (virtual reality, mixed reality, etc.) for secure applications.<\/p>\n<p>Whilst a lot of public attention is on the gaming aspect of XR, there is an increasing population of enterprise users. This makes the security of those working in XR paramount. In our experimentation, we found that a simple wearable accelerometer (such as found in a smartwatch or phone) is sufficient to differentiate between different activities (in this case Half-Life: Alyx, Beat Saber or Pistol Whip).<br><\/p>\n<p>With sufficient training data, we anticipate that it will be feasible to identify specific actions carried out by a user (such as entering credentials or interacting with applications in a specific way) which would enable eavesdropping on a user in VR.<\/p>\n<h2>Abstract<\/h2>\n<p>Extended reality technologies such as virtual reality are becoming increasingly common for enterprise applications. They have the potential to create secure multi-user environment in previously less-secure spaces, without the need for privacy filters or secure rooms. In this pilot paper we explore how malicious actors may be able to eavesdrop on a virtual reality session, by tracking the physical movements of a user. This is carried out using a third-party accelerometer, attached to the user. Through initial experimentation, we observe that specific actions and session types can be identified through visual analysis of the accelerometer. We posit there is substantial potential for sophisticated and automatic classification of user activity in VR. We discuss how this may enable eavesdropping by malicious actors, or could serve as a mechanism for improved security.<\/p>\n<h2>Best Presentation Award<\/h2>\n<p>This paper received the Best Presentation award at the 18th Annual IEEE International Conference on Intelligence and Security Informatics.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f85d686 elementor-widget elementor-widget-image\" data-id=\"f85d686\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"411\" src=\"https:\/\/tagowill.com\/portfolio\/wp-content\/uploads\/2021\/02\/WhatsApp-Image-2021-01-25-at-10.53.39-1024x411.jpeg\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/tagowill.com\/portfolio\/wp-content\/uploads\/2021\/02\/WhatsApp-Image-2021-01-25-at-10.53.39-1024x411.jpeg 1024w, https:\/\/tagowill.com\/portfolio\/wp-content\/uploads\/2021\/02\/WhatsApp-Image-2021-01-25-at-10.53.39-300x120.jpeg 300w, https:\/\/tagowill.com\/portfolio\/wp-content\/uploads\/2021\/02\/WhatsApp-Image-2021-01-25-at-10.53.39-768x308.jpeg 768w, https:\/\/tagowill.com\/portfolio\/wp-content\/uploads\/2021\/02\/WhatsApp-Image-2021-01-25-at-10.53.39-1536x617.jpeg 1536w, https:\/\/tagowill.com\/portfolio\/wp-content\/uploads\/2021\/02\/WhatsApp-Image-2021-01-25-at-10.53.39-600x241.jpeg 600w, https:\/\/tagowill.com\/portfolio\/wp-content\/uploads\/2021\/02\/WhatsApp-Image-2021-01-25-at-10.53.39.jpeg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4cf3f66a elementor-widget elementor-widget-text-editor\" data-id=\"4cf3f66a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h2>Citations<\/h2><p>Please use this identifier to cite this item:<br \/>T. M. Andrade, M. Smith-Creasey and J. F. Roscoe, &#8220;Discerning User Activity in Extended Reality Through Side-Channel Accelerometer Observations,&#8221;\u00a0<em>2020 IEEE International Conference on Intelligence and Security Informatics (ISI)<\/em>, Arlington, VA, USA, 2020, pp. 1-3, doi: 10.1109\/ISI49825.2020.9280516.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3ebf9b82\" data-id=\"3ebf9b82\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a87eb87 elementor-align-left elementor-widget elementor-widget-button\" data-id=\"a87eb87\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a href=\"https:\/\/ieeexplore.ieee.org\/document\/9280516\" class=\"elementor-button-link elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">More Info<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f0caba5 elementor-align-left elementor-widget elementor-widget-button\" data-id=\"f0caba5\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a href=\"https:\/\/www.researchgate.net\/profile\/Jonathan-Francis-Roscoe\/publication\/345808472_Discerning_User_Activity_in_Extended_Reality_Through_Side-Channel_Accelerometer_Observations\/links\/5fd37e8d299bf14088ff5501\/Discerning-User-Activity-in-Extended-Reality-Through-Side-Channel-Accelerometer-Observations.pdf?origin=profileFeaturedResearchPublicationItem\" class=\"elementor-button-link elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Download<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e3bcb1b elementor-widget elementor-widget-heading\" data-id=\"2e3bcb1b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Published On<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2054259d elementor-widget elementor-widget-text-editor\" data-id=\"2054259d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>09\/11\/2020<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c10d86e elementor-widget elementor-widget-heading\" data-id=\"c10d86e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Publisher<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-35a79377 elementor-widget elementor-widget-text-editor\" data-id=\"35a79377\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><a href=\"http:\/\/ieee.org\">IEEE<\/a><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4ed05e4b elementor-widget elementor-widget-heading\" data-id=\"4ed05e4b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Conference<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6590380 elementor-widget elementor-widget-text-editor\" data-id=\"6590380\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><a href=\"https:\/\/ieeexplore.ieee.org\/xpl\/conhome\/9280504\/proceeding\">2020 IEEE International Conference on Intelligence and Security Informatics (ISI)<\/a><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1be99e1 elementor-widget elementor-widget-heading\" data-id=\"1be99e1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Relevant Topics<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c943080 elementor-widget elementor-widget-text-editor\" data-id=\"c943080\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul><li>Virtual Reality<\/li><li>Cyber Security<\/li><li>Wearables<\/li><li>IoT<\/li><li>User Behaviour<\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Scientific paper that highlights an important issue for those seeking to utilise XR (virtual reality, mixed reality, etc.) for secure applications.<\/p>\n","protected":false},"featured_media":1249,"template":"","portfolio-category":[33,41,34,27],"class_list":["post-574","portfolio_xion","type-portfolio_xion","status-publish","has-post-thumbnail","hentry","portfolio-category-awards","portfolio-category-bt-publications","portfolio-category-publications","portfolio-category-vr-publications"],"_links":{"self":[{"href":"https:\/\/tagowill.com\/portfolio\/wp-json\/wp\/v2\/portfolio_xion\/574","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tagowill.com\/portfolio\/wp-json\/wp\/v2\/portfolio_xion"}],"about":[{"href":"https:\/\/tagowill.com\/portfolio\/wp-json\/wp\/v2\/types\/portfolio_xion"}],"version-history":[{"count":51,"href":"https:\/\/tagowill.com\/portfolio\/wp-json\/wp\/v2\/portfolio_xion\/574\/revisions"}],"predecessor-version":[{"id":1640,"href":"https:\/\/tagowill.com\/portfolio\/wp-json\/wp\/v2\/portfolio_xion\/574\/revisions\/1640"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tagowill.com\/portfolio\/wp-json\/wp\/v2\/media\/1249"}],"wp:attachment":[{"href":"https:\/\/tagowill.com\/portfolio\/wp-json\/wp\/v2\/media?parent=574"}],"wp:term":[{"taxonomy":"portfolio-category","embeddable":true,"href":"https:\/\/tagowill.com\/portfolio\/wp-json\/wp\/v2\/portfolio-category?post=574"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}