skip to main content
research-article
Open access

Going Incognito in the Metaverse: Achieving Theoretically Optimal Privacy-Usability Tradeoffs in VR

Published: 29 October 2023 Publication History

Abstract

Virtual reality (VR) telepresence applications and the so-called “metaverse” promise to be the next major medium of human-computer interaction. However, with recent studies demonstrating the ease at which VR users can be profiled and deanonymized, metaverse platforms carry many of the privacy risks of the conventional internet (and more) while at present offering few of the defensive utilities that users are accustomed to having access to. To remedy this, we present the first known method of implementing an “incognito mode” for VR. Our technique leverages local ε-differential privacy to quantifiably obscure sensitive user data attributes, with a focus on intelligently adding noise when and where it is needed most to maximize privacy while minimizing usability impact. Our system is capable of flexibly adapting to the unique needs of each VR application to further optimize this trade-off. We implement our solution as a universal Unity (C#) plugin that we then evaluate using several popular VR applications. Upon faithfully replicating the most well-known VR privacy attack studies, we show a significant degradation of attacker capabilities when using our solution.

Supplemental Material

ZIP File
Supplemental File

References

[1]
Brave Software, Inc.2023. Brave. https://brave.com/. Online; accessed 21 July 2022.
[2]
Parastoo Abtahi, Sidney Q Hough, James A Landay, and Sean Follmer. 2022. Beyond being real: a sensorimotor control perspective on interactions in virtual reality., 17 pages.
[3]
Devon Adams, Alseny Bah, Catherine Barwulor, Nureli Musaby, Kadeem Pitkin, and Elissa M. Redmiles. 2018. Ethics Emerging: the Story of Privacy and Security Perceptions in Virtual Reality. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). USENIX Association, Baltimore, MD, 427–442. https://www.usenix.org/conference/soups2018/presentation/adams
[4]
Gaurav Aggarwal, Elie Bursztein, Collin Jackson, and Dan Boneh. 2010. An Analysis of Private Browsing Modes in Modern Browsers. In Proceedings of the 19th USENIX Conference on Security (Washington, DC) (USENIX Security’10). USENIX Association, USA, 6.
[5]
Jeff Avery, Daniel Vogel, Edward Lank, Damien Masson, and Hanae Rateau. 2019. Holding patterns: detecting handedness with a moving smartphone at pickup. In Proceedings of the 31st Conference on l’Interaction Homme-Machine - IHM ’19. ACM Press, Grenoble, France, 7 pages. https://doi.org/10.1145/3366550.3372253
[6]
Beat Games. 2023. Beat Saber. https://beatsaber.com/. Online; accessed 13 July 2022.
[7]
Kent Bye, Diane Hosfelt, Sam Chase, Matt Miesnieks, and Taylor Beck. 2019. The Ethical and Privacy Implications of Mixed Reality. In ACM SIGGRAPH 2019 Panels (Los Angeles, California) (SIGGRAPH ’19). Association for Computing Machinery, New York, NY, USA, Article 4, 2 pages. https://doi.org/10.1145/3306212.3328138
[8]
Aaron Cahn, Scott Alfeld, Paul Barford, and S. Muthukrishnan. 2016. An Empirical Study of Web Cookies. In Proceedings of the 25th International Conference on World Wide Web (Montréal, Québec, Canada) (WWW ’16). International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, CHE, 891–901. https://doi.org/10.1145/2872427.2882991
[9]
Stuart K. Card, George G. Robertson, and Jock D. Mackinlay. 1991. The Information Visualizer, an Information Workspace. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (New Orleans, Louisiana, USA) (CHI ’91). Association for Computing Machinery, New York, NY, USA, 181–186. https://doi.org/10.1145/108844.108874
[10]
Center of Disease Control and Prevention. 2022. Percentile Data Files with LMS Values. https://www.cdc.gov/growthcharts/percentile_data_files.htm. Online; accessed 17 July 2022.
[11]
Morning Consult. 2022. National Tracking Poll 2203015., 137 pages.
[12]
Matthew Crain. 2021. Profit Over Privacy.
[13]
James E. Cutting and Lynn T. Kozlowski. 1977. Recognizing friends by their walk: Gait perception without familiarity cues. Bulletin of the Psychonomic Society 9, 5 (May 1977), 353–356. https://doi.org/10.3758/BF03337021
[14]
Brendan David-John, Diane Hosfelt, Kevin Butler, and Eakta Jain. 2021. A privacy-preserving approach to streaming eye-tracking data. IEEE Transactions on Visualization and Computer Graphics 27, 5 (2021), 2555–2565. https://doi.org/10.1109/TVCG.2021.3067787
[15]
Jaybie A. De Guzman, Kanchana Thilakarathna, and Aruna Seneviratne. 2020. Security and Privacy Approaches in Mixed Reality: A Literature Survey., 37 pages. https://doi.org/10.1145/3359626
[16]
Ellysse Dick. 2021. Balancing User Privacy and Innovation in Augmented and Virtual Reality., 28 pages.
[17]
Roger Dingledine, Nick Mathewson, and Paul F. Syverson. 2004. Tor: The Second-Generation Onion Router.
[18]
Neil A Dodgson. 2004. Variation and extrema of human interpupillary distance., 36–46 pages.
[19]
Duck Duck Go, Inc.2023. Duck Duck Go. https://duckduckgo.com/. Online; accessed 21 July 2022.
[20]
Cynthia Dwork, Nitin Kohli, and Deirdre Mulligan. 2019. Differential Privacy in Practice: Expose your Epsilons!Journal of Privacy and Confidentiality 9, 2 (Oct. 2019), 22 pages. https://doi.org/10.29012/jpc.689
[21]
Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating Noise to Sensitivity in Private Data Analysis. In Theory of Cryptography, Shai Halevi and Tal Rabin (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 265–284. https://link.springer.com/chapter/10.1007/11681878_14 Online; accessed 30 December 2021.
[22]
Cynthia Dwork and Aaron Roth. 2013. The Algorithmic Foundations of Differential Privacy. Foundations and Trends in Theoretical Computer Science 9, 3-4 (2013), 211–407. https://doi.org/10.1561/0400000042
[23]
Steven Englehardt, Dillon Reisman, Christian Eubank, Peter Zimmerman, Jonathan Mayer, Arvind Narayanan, and Edward W. Felten. 2015. Cookies That Give You Away: The Surveillance Implications of Web Tracking., 289–299 pages. https://doi.org/10.1145/2736277.2741679
[24]
Ben Falchuk, Shoshana Loeb, and Ralph Neff. 2018. The Social Metaverse: Battle for Privacy. IEEE Technology and Society Magazine 37, 2 (2018), 52–61. https://doi.org/10.1109/MTS.2018.2826060
[25]
Berserk Games. 2022. Tabletop Simulator. https://www.tabletopsimulator.com. Online.
[26]
Gamespot. 2015. Valve and HTC Reveal Vive VR Headset. https://www.gamespot.com/articles/valve-and-htc-reveal-vive-vr-headset/1100-6425606/. Online; accessed 17 July 2022.
[27]
Gonzalo Munilla Garrido, Vivek Nair, and Dawn Song. 2023. SoK: Data Privacy in Virtual Reality.
[28]
Roberto Gonzalez, Claudio Soriente, Juan Miguel Carrascosa, Alberto Garcia-Duran, Costas Iordanou, and Mathias Niepert. 2021. User Profiling by Network Observers. In Proceedings of the 17th International Conference on Emerging Networking EXperiments and Technologies (Virtual Event, Germany) (CoNEXT ’21). Association for Computing Machinery, New York, NY, USA, 212–222. https://doi.org/10.1145/3485983.3494859
[29]
Aniket Gulhane, Akhil Vyas, Reshmi Mitra, Roland Oruche, Gabriela Hoefer, Samaikya Valluripally, Prasad Calyam, and Khaza Anuarul Hoque. 2019. Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications., 9 pages. https://doi.org/10.1109/CCNC.2019.8651847
[30]
Hana Habib, Jessica Colnago, Vidya Gopalakrishnan, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, and Lorrie Faith Cranor. 2018. Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). USENIX Association, Baltimore, MD, 159–175. https://www.usenix.org/conference/soups2018/presentation/habib-prying
[31]
Naoise Holohan, Spiros Antonatos, Stefano Braghin, and Pól Mac Aonghusa. 2019. The Bounded Laplace Mechanism in Differential Privacy. Journal of Privacy and Confidentiality 10, 1 (Dec. 2019), 6 pages. https://doi.org/10.29012/jpc.715
[32]
Naoise Holohan and Stefano Braghin. 2021. Secure Random Sampling in Differential Privacy. In Computer Security – ESORICS 2021, Elisa Bertino, Haya Shulman, and Michael Waidner (Eds.). Vol. 12973. Springer International Publishing, Cham, 523–542. https://doi.org/10.1007/978-3-030-88428-4_26 Series Title: Lecture Notes in Computer Science.
[33]
VRChat Inc.2022. VRChat. https://hello.vrchat.com/. Online; accessed 17 May 2022.
[34]
Brendan John, Ao Liu, Lirong Xia, Sanjeev Koppal, and Eakta Jain. 2020. Let It Snow: Adding Pixel Noise to Protect the User’s Identity. In ACM Symposium on Eye Tracking Research and Applications (Stuttgart, Germany) (ETRA ’20 Adjunct). Association for Computing Machinery, New York, NY, USA, Article 43, 3 pages. https://doi.org/10.1145/3379157.3390512
[35]
Nesrine Kaaniche, Maryline Laurent, and Sana Belguith. 2020. Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey.
[36]
Ishan Karunanayake, Nadeem Ahmed, Robert Malaney, Rafiqul Islam, and Sanjay K. Jha. 2021. De-Anonymisation Attacks on Tor: A Survey. IEEE Communications Surveys & Tutorials 23, 4 (2021), 2324–2350. https://doi.org/10.1109/COMST.2021.3093615
[37]
Christina Katsini, Yasmeen Abdrabou, George E. Raptis, Mohamed Khamis, and Florian Alt. 2020. The Role of Eye Gaze in Security and Privacy Applications: Survey and Future HCI Research Directions. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (Honolulu, HI, USA) (CHI ’20). Association for Computing Machinery, New York, NY, USA, 1–21. https://doi.org/10.1145/3313831.3376840
[38]
Fragkiskos Koufogiannis, Shuo Han, and George J. Pappas. 2015. Optimality of the Laplace Mechanism in Differential Privacy. https://doi.org/10.48550/ARXIV.1504.00065
[39]
Lynn T. Kozlowski and James E. Cutting. 1977. Recognizing the sex of a walker from a dynamic point-light display. Perception & Psychophysics 21, 6 (Nov. 1977), 575–580. https://doi.org/10.3758/BF03198740
[40]
Jacob Leon Kröger, Otto Hans-Martin Lutz, and Florian Müller. 2020. What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking. In Privacy and Identity Management. Data for Better Living: AI and Privacy: 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19–23, 2019, Revised Selected Papers, Michael Friedewald, Melek Önen, Eva Lievens, Stephan Krenn, and Samuel Fricker (Eds.). Springer International Publishing, Cham, 226–241. https://doi.org/10.1007/978-3-030-42504-3_15
[41]
Pierre Laperdrix, Nataliia Bielova, Benoit Baudry, and Gildas Avoine. 2020. Browser Fingerprinting: A Survey. ACM Trans. Web 14, 2, Article 8 (apr 2020), 33 pages. https://doi.org/10.1145/3386040
[42]
Ronald Leenes. 2008. Privacy in the Metaverse. In The Future of Identity in the Information Society, Simone Fischer-Hübner, Penny Duquenoy, Albin Zuccato, and Leonardo Martucci (Eds.). Springer US, Boston, MA, 95–112.
[43]
Jingjie Li, Amrita Roy Chowdhury, Kassem Fawaz, and Younghyun Kim. 2021. KalYou: Real-Time Privacy Control for Eye-Tracking Systems., 1793–1810 pages. https://www.usenix.org/conference/usenixsecurity21/presentation/li-jingjie
[44]
Sugang Li, Ashwin Ashok, Yanyong Zhang, Chenren Xu, Janne Lindqvist, and Macro Gruteser. 2016. Whose move is it anyway? Authenticating smart wearable devices using unique head movement patterns., 9 pages. https://doi.org/10.1109/PERCOM.2016.7456514
[45]
Bin Liang, Wei You, Liangkun Liu, Wenchang Shi, and Mario Heiderich. 2014. Scriptless Timing Attacks on Web Browser Privacy., 112-123 pages. https://doi.org/10.1109/DSN.2014.93
[46]
Junsu Lim, Hyeonggeun Yun, Auejin Ham, and Sunjun Kim. 2022. Mine Yourself!: A Role-Playing Privacy Tutorial in Virtual Reality Environment. In CHI Conference on Human Factors in Computing Systems Extended Abstracts (New Orleans, LA, USA) (CHI EA ’22). Association for Computing Machinery, New York, NY, USA, Article 375, 7 pages. https://doi.org/10.1145/3491101.3519773
[47]
Ao Liu, Lirong Xia, Andrew Duchowski, Reynold Bailey, Kenneth Holmqvist, and Eakta Jain. 2019. Differential Privacy for Eye-Tracking Data., 10 pages. https://doi.org/10.1145/3314111.3319823
[48]
Divine Maloney, Samaneh Zamanifard, and Guo Freeman. 2020. Anonymity vs. Familiarity: Self-Disclosure and Privacy in Social Virtual Reality. In 26th ACM Symposium on Virtual Reality Software and Technology (Virtual Event, Canada) (VRST ’20). Association for Computing Machinery, New York, NY, USA, Article 25, 9 pages. https://doi.org/10.1145/3385956.3418967
[49]
Divine Maloney, Samaneh Zamanifard, and Guo Freeman. 2020. Anonymity vs. Familiarity: Self-Disclosure and Privacy in Social Virtual Reality. In 26th ACM Symposium on Virtual Reality Software and Technology (Virtual Event, Canada) (VRST ’20). Association for Computing Machinery, New York, NY, USA, Article 25, 9 pages. https://doi.org/10.1145/3385956.3418967
[50]
MelonLoader community. 2022. Melon Loader. https://melonwiki.xyz/. Online; accessed 22 July 2022.
[51]
Meta. 2022. Horizon Worlds. https://www.oculus.com/horizon-worlds/. Online; accessed 17 May 2022.
[52]
Meta. 2022. Oculus Go Features. https://www.oculus.com/go/features/. Online; accessed 17 July 2022.
[53]
Microsoft. 2022. AltspaceVR. https://altvr.com. Online; accessed 17 May 2022.
[54]
Mark Roman Miller, Fernanda Herrera, Hanseul Jun, James A. Landay, and Jeremy N. Bailenson. 2020. Personal identifiability of user tracking data during observation of 360-degree VR video., 17404 pages. https://doi.org/10.1038/s41598-020-74486-y
[55]
Robert Miller, Natasha Kholgade Banerjee, and Sean Banerjee. 2022. Combining Real-World Constraints on User Behavior with Deep Neural Networks for Virtual Reality (VR) Biometrics., 409-418 pages. https://doi.org/10.1109/VR51125.2022.00060
[56]
Robert B. Miller. 1968. Response Time in Man-Computer Conversational Transactions. In Proceedings of the December 9-11, 1968, Fall Joint Computer Conference, Part I (San Francisco, California) (AFIPS ’68 (Fall, part I)). Association for Computing Machinery, New York, NY, USA, 267–277. https://doi.org/10.1145/1476589.1476628
[57]
Ilya Mironov. 2012. On significance of the least significant bits for differential privacy. In Proceedings of the 2012 ACM conference on Computer and communications security - CCS ’12. ACM Press, Raleigh, North Carolina, USA, 650. https://doi.org/10.1145/2382196.2382264
[58]
Kelley Misata, Raymond A. Hansen, and Baijian Yang. 2014. A Taxonomy of Privacy-Protecting Tools to Browse the World Wide Web. In Proceedings of the 3rd Annual Conference on Research in Information Technology (Atlanta, Georgia, USA) (RIIT ’14). Association for Computing Machinery, New York, NY, USA, 63–68. https://doi.org/10.1145/2656434.2656446
[59]
Tahrima Mustafa, Richard Matovu, Abdul Serwadda, and Nicholas Muirhead. 2018. Unsure How to Authenticate on Your VR Headset? Come on, Use Your Head!. In Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics (Tempe, AZ, USA) (IWSPA ’18). Association for Computing Machinery, New York, NY, USA, 23–30. https://doi.org/10.1145/3180445.3180450
[60]
Brad A. Myers. 1985. The Importance of Percent-Done Progress Indicators for Computer-Human Interfaces. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (San Francisco, California, USA) (CHI ’85). Association for Computing Machinery, New York, NY, USA, 11–17. https://doi.org/10.1145/317456.317459
[61]
Stylianos Mystakidis. 2023. Metaverse., 486–497 pages. https://doi.org/10.3390/encyclopedia2010031
[62]
Vivek Nair. 2022. MetaGuard repository. https://github.com/metaguard/metaguard. Online.
[63]
Vivek Nair, Gonzalo Munilla Garrido, and Dawn Song. 2022. Exploring the Unprecedented Privacy Risks of the Metaverse. arxiv:2207.13176 [cs.CR]
[64]
Vivek Nair, Wenbo Guo, Justus Mattern, Rui Wang, James F. O’Brien, Louis Rosenberg, and Dawn Song. 2023. Unique Identification of 50,000+ Virtual Reality Users from Head & Hand Motion Data. arxiv:2302.08927 [cs.CR]
[65]
Fiachra O’Brolcháin, Tim Jacquemard, David Monaghan, Noel O’Connor, Peter Novitzky, and Bert Gordijn. 2016. The Convergence of Virtual Reality and Social Networks: Threats to Privacy and Autonomy., 29 pages. https://doi.org/10.1007/s11948-014-9621-1
[66]
Fiachra O’Brolcháin, Tim Jacquemard, David Monaghan, Noel O’Connor, Peter Novitzky, and Bert Gordijn. 2016. The Convergence of Virtual Reality and Social Networks: Threats to Privacy and Autonomy., 29 pages. https://doi.org/10.1007/s11948-014-9621-1
[67]
Ken Pfeuffer, Matthias J. Geiger, Sarah Prange, Lukas Mecke, Daniel Buschek, and Florian Alt. 2019. Behavioural Biometrics in VR: Identifying People from Body Motion and Relations in Virtual Reality. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (Glasgow, Scotland Uk) (CHI ’19). Association for Computing Machinery, New York, NY, USA, 1–12. https://doi.org/10.1145/3290605.3300340
[68]
Ivan Poupyrev, Mark Billinghurst, Suzanne Weghorst, and Tadao Ichikawa. 1996. The go-go interaction technique: non-linear mapping for direct manipulation in VR., 79–80 pages.
[69]
Michael L. Hicks published. 2022. Despite Quest 2 sales success, Meta lost $10.2 billion on VR/AR last year. https://www.androidcentral.com/despite-quest-2-sales-success-meta-lost-102-billion-vrar-last-year
[70]
Daniel E. Re, Jillian J. M. O’Connor, Patrick J. Bennett, and David R. Feinberg. 2012. Preferences for Very Low and Very High Voice Pitch in Humans., e32719 pages. https://doi.org/10.1371/journal.pone.0032719
[71]
Black Rock. 2023. The metaverse: Investing in the future now. https://www.blackrock.com/us/individual/insights/metaverse-investing-in-the-future. Online; accessed 17 May 2022.
[72]
Cynthia E. Rogers, Alexander W. Witt, Alexander D. Solomon, and Krishna K. Venkatasubramanian. 2015. An Approach for User Identification for Head-Mounted Displays. In Proceedings of the 2015 ACM International Symposium on Wearable Computers (Osaka, Japan) (ISWC ’15). Association for Computing Machinery, New York, NY, USA, 143–146. https://doi.org/10.1145/2802083.2808391
[73]
Amitav Sarma, Bhupen Barman, GautamC Das, Hiranya Saikia, and AmbathD Momin. 2020. Correlation between the arm-span and the standing height among males and females of the Khasi tribal population of Meghalaya state of North-Eastern India., 6125 pages. https://doi.org/10.4103/jfmpc.jfmpc_1350_20
[74]
KW Studios Sector3 Studios. 2022. RaceRoom. https://www.raceroom.com/en/. Online; accessed 17 May 2022.
[75]
Sizescreens. 2017. Samsung Gear VR 2017 detailed specifications. https://www.sizescreens.com/samsung-gear-vr-2017-specifications/. Online; accessed 17 July 2022.
[76]
Morgan Stanley. 2022. Metaverse: more evolutionary than revolutionary. https://www.morganstanley.com/ideas/metaverse-investing. Online; accessed 17 May 2022.
[77]
Julian Steil, Inken Hagestedt, Michael Xuelin Huang, and Andreas Bulling. 2019. Privacy-Aware Eye Tracking Using Differential Privacy. In Proceedings of the 11th ACM Symposium on Eye Tracking Research & amp; Applications (Denver, Colorado) (ETRA ’19). Association for Computing Machinery, New York, NY, USA, Article 27, 9 pages. https://doi.org/10.1145/3314111.3319915
[78]
Sophie Stephenson, Bijeeta Pal, Stephen Fan, Earlence Fernandes, Yuhang Zhao, and Rahul Chatterjee. 2022. SoK: Authentication in Augmented and Virtual Reality., 18 pages.
[79]
Philipp Sykownik, Divine Maloney, Guo Freeman, and Maic Masuch. 2022. Something Personal from the Metaverse: Goals, Topics, and Contextual Factors of Self-Disclosure in Commercial Social VR. In CHI Conference on Human Factors in Computing Systems (New Orleans, LA, USA) (CHI ’22). Association for Computing Machinery, New York, NY, USA, Article 632, 17 pages. https://doi.org/10.1145/3491102.3502008
[80]
Rahmadi Trimananda, Hieu Le, Hao Cui, Janice Tran Ho, Anastasia Shuba, and Athina Markopoulou. 2022. OVRseen: Auditing Network Traffic and Privacy Policies in Oculus VR. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 3789–3806. https://www.usenix.org/conference/usenixsecurity22/presentation/trimananda
[81]
Nikolaos Tsalis, Alexios Mylonas, Antonia Nisioti, Dimitris Gritzalis, and Vasilios Katos. 2017. Exploring the protection of private browsing in desktop browsers., 181–197 pages. https://doi.org/10.1016/j.cose.2017.03.006
[82]
Unity. 2022. Unity documentation. https://docs.unity3d.com/Manual/VROverview.html. Online; accessed 17 July 2022.
[83]
Samaikya Valluripally, Aniket Gulhane, Reshmi Mitra, Khaza Anuarul Hoque, and Prasad Calyam. 2020. Attack Trees for Security and Privacy in Social Virtual Reality Learning Environments., 9 pages. https://doi.org/10.1109/CCNC46108.2020.9045724
[84]
Valve. 2022. OpenVR. https://github.com/ValveSoftware/openvr. Online.
[85]
Vive. 2022. SteamVR Base Station 2.0. https://www.vive.com/us/accessory/base-station2/. Online; accessed 17 July 2022.
[86]
Stanley L Warner. 1965. Randomized Response: A Survey Technique for Eliminating Evasive Answer Bias. J. Amer. Statist. Assoc. 60, 309 (1965), 63–69. https://doi.org/10.1080/01621459.1965.10480775
[87]
Andrea Stevenson Won, Jeremy Bailenson, Jimmy Lee, and Jaron Lanier. 2015. Homuncular flexibility in virtual reality. Journal of Computer-Mediated Communication 20, 3 (2015), 241–259.
[88]
David L. Woods, John M. Wyma, E. William Yund, Timothy J. Herron, and Bruce Reed. 2015. Age-related slowing of response selection and production in a visual choice reaction time task. https://doi.org/10.3389/fnhum.2015.00193
[89]
Chuan Yue. 2016. Sensor-Based Mobile Web Fingerprinting and Cross-Site Input Inference Attacks., 241-244 pages. https://doi.org/10.1109/SPW.2016.17
[90]
Mojtaba Zaheri, Yossi Oren, and Reza Curtmola. 2022. Targeted Deanonymization via the Cache Side Channel: Attacks and Defenses. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 20 pages. https://www.usenix.org/conference/usenixsecurity22/presentation/zaheri
[91]
Jun Zhao, Teng Wang, Tao Bai, Kwok-Yan Lam, Zhiying Xu, Shuyu Shi, Xuebin Ren, Xinyu Yang, Yang Liu, and Han Yu. 2019. Reviewing and Improving the Gaussian Mechanism for Differential Privacy. arxiv:1911.12060 [cs.CR]
[92]
Hao Zhu, Yanyong Zhang, Xing Guo, and Xiang-Yang Li. 2021. Anti Leakage: Protecting Privacy Hidden in Our Speech., 114-120 pages. https://doi.org/10.1109/BigCom53800.2021.00011

Cited By

View all
  • (2024)Embedding Large Language Models into Extended Reality: Opportunities and Challenges for Inclusion, Engagement, and PrivacyProceedings of the 6th ACM Conference on Conversational User Interfaces10.1145/3640794.3665563(1-7)Online publication date: 8-Jul-2024
  • (2024)Kinetic Signatures: A Systematic Investigation of Movement-Based User Identification in Virtual RealityProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642471(1-19)Online publication date: 11-May-2024
  • (2024)Deep Motion Masking for Secure, Usable, and Scalable Real-Time Anonymization of Ecological Virtual Reality Motion Data2024 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)10.1109/VRW62533.2024.00096(493-500)Online publication date: 16-Mar-2024
  • Show More Cited By

Index Terms

  1. Going Incognito in the Metaverse: Achieving Theoretically Optimal Privacy-Usability Tradeoffs in VR

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    UIST '23: Proceedings of the 36th Annual ACM Symposium on User Interface Software and Technology
    October 2023
    1825 pages
    ISBN:9798400701320
    DOI:10.1145/3586183
    This work is licensed under a Creative Commons Attribution International 4.0 License.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 29 October 2023

    Check for updates

    Badges

    • Best Paper

    Author Tags

    1. data harvesting
    2. differential privacy
    3. identification
    4. incognito mode
    5. private browsing
    6. profiling
    7. usable security
    8. virtual reality

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    UIST '23

    Acceptance Rates

    Overall Acceptance Rate 561 of 2,567 submissions, 22%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1,604
    • Downloads (Last 6 weeks)193
    Reflects downloads up to 06 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Embedding Large Language Models into Extended Reality: Opportunities and Challenges for Inclusion, Engagement, and PrivacyProceedings of the 6th ACM Conference on Conversational User Interfaces10.1145/3640794.3665563(1-7)Online publication date: 8-Jul-2024
    • (2024)Kinetic Signatures: A Systematic Investigation of Movement-Based User Identification in Virtual RealityProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642471(1-19)Online publication date: 11-May-2024
    • (2024)Deep Motion Masking for Secure, Usable, and Scalable Real-Time Anonymization of Ecological Virtual Reality Motion Data2024 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)10.1109/VRW62533.2024.00096(493-500)Online publication date: 16-Mar-2024
    • (2024)Inferring Private Personal Attributes of Virtual Reality Users from Ecologically Valid Head and Hand Motion Data2024 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)10.1109/VRW62533.2024.00094(477-484)Online publication date: 16-Mar-2024
    • (2024)Berkeley Open Extended Reality Recordings 2023 (BOXRR-23): 4.7 Million Motion Capture Recordings from 105,000 XR UsersIEEE Transactions on Visualization and Computer Graphics10.1109/TVCG.2024.337208730:5(2239-2246)Online publication date: 4-Mar-2024
    • (2024)PrivXR: A Cross-Platform Privacy-Preserving API and Privacy Panel for Extended Reality2024 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)10.1109/PerComWorkshops59983.2024.10503341(417-420)Online publication date: 11-Mar-2024
    • (2024)Mitigating Privacy Threats Without Degrading Visual Quality of VR Applications: Using Re-Identification Attack as a Case Study2024 IEEE 7th International Conference on Multimedia Information Processing and Retrieval (MIPR)10.1109/MIPR62202.2024.00040(214-220)Online publication date: 7-Aug-2024
    • (2024)Digital Healthcare in the Metaverse: Insights into Privacy and SecurityIEEE Consumer Electronics Magazine10.1109/MCE.2023.333449413:3(80-89)Online publication date: May-2024
    • (2024)Improving QoE-Privacy Tradeoff in XR StreamingIEEE Signal Processing Letters10.1109/LSP.2024.340161631(1504-1508)Online publication date: 2024
    • (2023)Global Differential Privacy for Distributed Metaverse Healthcare Systems2023 International Conference on Intelligent Metaverse Technologies & Applications (iMETA)10.1109/iMETA59369.2023.10294469(01-08)Online publication date: 18-Sep-2023
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media