Virtual Keymysteries Unveiled: Detecting Keystrokes in VR with External Side-Channels

被引:0
|
作者
Khalili, Hossein [1 ]
Chen, Alexander [1 ]
Papaiakovou, Theodoros [1 ]
Jacques, Timothy [1 ]
Chien, Hao-Jen [1 ]
Liu, Changwei [2 ]
Ding, Aolin [2 ]
Hass, Amin [2 ]
Zonouz, Saman [3 ]
Sehatbakhsh, Nader [1 ]
机构
[1] Univ Calif Los Angeles, SsysArch Lab, ECE Dept, Los Angeles, CA 90095 USA
[2] Accenture Cyber Fusion Ctr, Accenture Labs, Cyber Lab, Arlington, VA USA
[3] Georgia Inst Technol, SCP Dept, CPSec Lab, Atlanta, GA USA
来源
PROCEEDINGS 45TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS, SPW 2024 | 2024年
关键词
D O I
10.1109/SPW63631.2024.00031
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
AR/VR devices are becoming prevalent, permeating different facets of our daily lives. Nevertheless, this prevalence presents fresh security and privacy hurdles as users increasingly employ these devices to manage sensitive data such as passwords, personal information, and financial data in potentially insecure settings. Due to these concerns, there has been an increasing trend in the literature to analyze security and privacy threats for AR/VR by proposing novel attack strategies. While effective and worrisome, the existing body of work has focused mostly on internal threats for AR/VR devices, such as malicious sensors, apps, or firmware. However, in this paper, we focus on a new facet of this body of research by designing an external attacker. The key observation is that although the virtual world remains concealed from an external observer (i.e., an adversary), the physical interactions required to input commands into the VR world are observable and create a side channel. Building upon this finding, we conduct a practical attack, named LensHack, on Quest 2 VR devices. By employing our algorithm and an external camera (Blink), we capture and analyze the interactions between the user and the device, successfully extracting typed characters with over 80% accuracy.
引用
收藏
页码:260 / 266
页数:7
相关论文
共 2 条
  • [1] De-anonymizing VR Avatars using Non-VR Motion Side-channels
    Sabra, Mohd
    Vinayaga-Sureshkanth, Nisha
    Sharma, Ari
    Maiti, Anindya
    Jadliwala, Murtuza
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS, WISEC 2024, 2024, : 54 - 65
  • [2] A Comparison of Backscattering, EM, and Power Side-Channels and Their Performance in Detecting Software and Hardware Intrusions
    Luong N. Nguyen
    Chia-Lin Cheng
    Frank T. Werner
    Milos Prvulovic
    Alenka Zajic
    Journal of Hardware and Systems Security, 2020, 4 (2) : 150 - 165