ARSecure: A Novel End-to-End Encryption Messaging System Using Augmented Reality
- URL: http://arxiv.org/abs/2409.04457v1
- Date: Wed, 28 Aug 2024 16:39:43 GMT
- Title: ARSecure: A Novel End-to-End Encryption Messaging System Using Augmented Reality
- Authors: Hamish Alsop, Douglas Alsop, Joseph Solomon, Liam Aumento, Mark Butters, Cameron Millar, Yagmur Yigit, Leandros Maglaras, Naghmeh Moradpoor,
- Abstract summary: We introduce ARSecure, a novel end-to-end encryption messaging solution utilizing augmented reality glasses.
ARSecure allows users to encrypt and decrypt their messages before they reach their phone devices, effectively countering the CSS technology in E2EE systems.
- Score: 0.28087862620958753
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: End-to-End Encryption (E2EE) ensures that only the intended recipient(s) can read messages. Popular instant messaging (IM) applications such as Signal, WhatsApp, Apple's iMessage, and Telegram claim to offer E2EE. However, client-side scanning (CSS) undermines these claims by scanning all messages, including text, images, audio, and video files, on both sending and receiving ends. Industry and government parties support CSS to combat harmful content such as child pornography, terrorism, and other illegal activities. In this paper, we introduce ARSecure, a novel end-to-end encryption messaging solution utilizing augmented reality glasses. ARSecure allows users to encrypt and decrypt their messages before they reach their phone devices, effectively countering the CSS technology in E2EE systems.
Related papers
- Understanding crypter-as-a-service in a popular underground marketplace [51.328567400947435]
Crypters are pieces of software whose main goal is to transform a target binary so it can avoid detection from Anti Viruses (AVs) applications.
The crypter-as-a-service model has gained popularity, in response to the increased sophistication of detection mechanisms.
This paper provides the first study on an online underground market dedicated to crypter-as-a-service.
arXiv Detail & Related papers (2024-05-20T08:35:39Z) - Silent Guardian: Protecting Text from Malicious Exploitation by Large Language Models [63.91178922306669]
We introduce Silent Guardian, a text protection mechanism against large language models (LLMs)
By carefully modifying the text to be protected, TPE can induce LLMs to first sample the end token, thus directly terminating the interaction.
We show that SG can effectively protect the target text under various configurations and achieve almost 100% protection success rate in some cases.
arXiv Detail & Related papers (2023-12-15T10:30:36Z) - InfoGuard: A Design and Usability Study of User-Controlled Application-Independent Encryption for Privacy-Conscious Users [1.2499537119440245]
Billions of secure messaging users have adopted end-to-end encryption (E2EE)
Most communication applications do not provide E2EE, and application silos prevent interoperability.
We propose InfoGuard, a system enabling E2EE for user-to-user communication in any application.
arXiv Detail & Related papers (2023-11-01T19:54:01Z) - Commercial Anti-Smishing Tools and Their Comparative Effectiveness Against Modern Threats [0.0]
We developed a test bed for measuring the effectiveness of popular anti-smishing tools against fresh smishing attacks.
Most anti-phishing apps and bulk messaging services didn't filter smishing messages beyond the carrier blocking.
While carriers did not block any benign messages, they were only able to reach a 25-35% blocking rate for smishing messages.
arXiv Detail & Related papers (2023-09-14T06:08:22Z) - GPT-4 Is Too Smart To Be Safe: Stealthy Chat with LLMs via Cipher [85.18213923151717]
Experimental results show certain ciphers succeed almost 100% of the time to bypass the safety alignment of GPT-4 in several safety domains.
We propose a novel SelfCipher that uses only role play and several demonstrations in natural language to evoke this capability.
arXiv Detail & Related papers (2023-08-12T04:05:57Z) - RiDDLE: Reversible and Diversified De-identification with Latent
Encryptor [57.66174700276893]
This work presents RiDDLE, short for Reversible and Diversified De-identification with Latent Encryptor.
Built upon a pre-learned StyleGAN2 generator, RiDDLE manages to encrypt and decrypt the facial identity within the latent space.
arXiv Detail & Related papers (2023-03-09T11:03:52Z) - SoK: Content Moderation for End-to-End Encryption [2.66512000865131]
Messaging applications now enable end-to-end-encryption (E2EE) by default, and E2EE data storage is becoming common.
These important advances for security and privacy create new content moderation challenges for online services.
We bridge literature that is diverse in both content moderation subject matter, such as malware, spam, hate speech, terrorist content, and enterprise policy compliance.
arXiv Detail & Related papers (2023-03-07T15:26:41Z) - Bugs in our Pockets: The Risks of Client-Side Scanning [8.963278092315946]
We argue that client-side scanning (CSS) neither guarantees efficacious crime prevention nor prevents surveillance.
CSS by its nature creates serious security and privacy risks for all society.
There are multiple ways in which client-side scanning can fail, can be evaded, and can be abused.
arXiv Detail & Related papers (2021-10-14T15:18:49Z) - Jettisoning Junk Messaging in the Era of End-to-End Encryption: A Case
Study of WhatsApp [8.463390032361591]
We study junk messaging on a multilingual dataset of 2.6M messages sent to 5K public WhatsApp groups in India.
We find that nearly 1 in 10 messages is unwanted content sent by junk senders.
arXiv Detail & Related papers (2021-06-08T15:52:46Z) - Robust and Verifiable Information Embedding Attacks to Deep Neural
Networks via Error-Correcting Codes [81.85509264573948]
In the era of deep learning, a user often leverages a third-party machine learning tool to train a deep neural network (DNN) classifier.
In an information embedding attack, an attacker is the provider of a malicious third-party machine learning tool.
In this work, we aim to design information embedding attacks that are verifiable and robust against popular post-processing methods.
arXiv Detail & Related papers (2020-10-26T17:42:42Z) - Mind the GAP: Security & Privacy Risks of Contact Tracing Apps [75.7995398006171]
Google and Apple have jointly provided an API for exposure notification in order to implement decentralized contract tracing apps using Bluetooth Low Energy.
We demonstrate that in real-world scenarios the GAP design is vulnerable to (i) profiling and possibly de-anonymizing persons, and (ii) relay-based wormhole attacks that basically can generate fake contacts.
arXiv Detail & Related papers (2020-06-10T16:05:05Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.