False Reality: Uncovering Sensor-induced Human-VR Interaction Vulnerability
- URL: http://arxiv.org/abs/2508.08043v1
- Date: Mon, 11 Aug 2025 14:47:23 GMT
- Title: False Reality: Uncovering Sensor-induced Human-VR Interaction Vulnerability
- Authors: Yancheng Jiang, Yan Jiang, Ruochen Zhou, Yi-Chao Chen, Xiaoyu Ji, Wenyuan Xu,
- Abstract summary: False Reality is a new attack threat to VR devices without requiring access to or modification of their software.<n>We formalize these threats through an attack pathway framework and validate three representative pathways.<n>Our findings shall provide valuable insights for enhancing the security and resilience of future VR systems.
- Score: 15.246996684892348
- License: http://creativecommons.org/licenses/by-sa/4.0/
- Abstract: Virtual Reality (VR) techniques, serving as the bridge between the real and virtual worlds, have boomed and are widely used in manufacturing, remote healthcare, gaming, etc. Specifically, VR systems offer users immersive experiences that include both perceptions and actions. Various studies have demonstrated that attackers can manipulate VR software to influence users' interactions, including perception and actions. However, such attacks typically require strong access and specialized expertise. In this paper, we are the first to present a systematic analysis of physical attacks against VR systems and introduce False Reality, a new attack threat to VR devices without requiring access to or modification of their software. False Reality disturbs VR system services by tampering with sensor measurements, and further spoofing users' perception even inducing harmful actions, e.g., inducing dizziness or causing users to crash into obstacles, by exploiting perceptual and psychological effects. We formalize these threats through an attack pathway framework and validate three representative pathways via physical experiments and user studies on five commercial VR devices. Finally, we further propose a defense prototype to mitigate such threats. Our findings shall provide valuable insights for enhancing the security and resilience of future VR systems.
Related papers
- Adversarial VR: An Open-Source Testbed for Evaluating Adversarial Robustness of VR Cybersickness Detection and Mitigation [0.0]
Adrial-VR is a novel real-time VR testbed for evaluating DL-based cybersickness detection and mitigation strategies under adversarial conditions.<n>We incorporate three SOTA adversarial attacks: MI-FGSM, PGD, and C&W, which successfully prevent cybersickness mitigation by fooling DL-based cybersickness models' outcomes.
arXiv Detail & Related papers (2025-12-18T19:45:47Z) - Towards Cybersickness Severity Classification from VR Gameplay Videos Using Transfer Learning and Temporal Modeling [9.488297561764211]
Cybersickness, marked by symptoms resembling motion sickness, continues to hinder widespread acceptance of virtual reality (VR)<n>In this study, we utilize transfer learning to extract high-level visual features from VR gameplay videos using the InceptionV3 model pretrained on the ImageNet dataset.<n>Our approach effectively leverages the time-series nature of video data, achieving a 68.4% classification accuracy for cybersickness severity.
arXiv Detail & Related papers (2025-10-12T03:10:05Z) - Securing Virtual Reality Experiences: Unveiling and Tackling Cybersickness Attacks with Explainable AI [2.076342899890871]
We present a new type of VR attack, i.e., a cybersickness attack, which successfully stops the triggering of cybersickness mitigation.<n>We propose a novel explainable artificial intelligence (XAI)-guided cybersickness attack detection framework to detect such attacks.
arXiv Detail & Related papers (2025-03-17T17:49:51Z) - Virtual Reality and Augmented Reality Security: A Reconnaissance and Vulnerability Assessment Approach [0.0]
Various industries have widely adopted Virtual Reality (VR) and Augmented Reality (AR) technologies to enhance productivity and user experiences.
This systematic literature review focuses on identifying devices used in AR and VR technologies and specifies the associated vulnerabilities.
arXiv Detail & Related papers (2024-07-22T18:51:59Z) - Inception Attacks: Immersive Hijacking in Virtual Reality Systems [24.280072806797243]
We introduce the immersive hijacking attack, where a remote attacker takes control of a user's interaction with their VR system.
All of the user's interactions with apps, services and other users can be recorded and modified without their knowledge.
We present our implementation of the immersive hijacking attack on Meta Quest headsets and conduct IRB-approved user studies.
arXiv Detail & Related papers (2024-03-08T23:22:16Z) - An Empirical Study on Oculus Virtual Reality Applications: Security and
Privacy Perspectives [46.995904896724994]
This paper develops a security and privacy assessment tool, namely the VR-SP detector for VR apps.
Using the VR-SP detector, we conduct a comprehensive empirical study on 500 popular VR apps.
We find that a number of security vulnerabilities and privacy leaks widely exist in VR apps.
arXiv Detail & Related papers (2024-02-21T13:53:25Z) - Deep Motion Masking for Secure, Usable, and Scalable Real-Time Anonymization of Virtual Reality Motion Data [49.68609500290361]
Recent studies have demonstrated that the motion tracking "telemetry" data used by nearly all VR applications is as uniquely identifiable as a fingerprint scan.
We present in this paper a state-of-the-art VR identification model that can convincingly bypass known defensive countermeasures.
arXiv Detail & Related papers (2023-11-09T01:34:22Z) - Force-Aware Interface via Electromyography for Natural VR/AR Interaction [69.1332992637271]
We design a learning-based neural interface for natural and intuitive force inputs in VR/AR.
We show that our interface can decode finger-wise forces in real-time with 3.3% mean error, and generalize to new users with little calibration.
We envision our findings to push forward research towards more realistic physicality in future VR/AR.
arXiv Detail & Related papers (2022-10-03T20:51:25Z) - Learning Effect of Lay People in Gesture-Based Locomotion in Virtual
Reality [81.5101473684021]
Some of the most promising methods are gesture-based and do not require additional handheld hardware.
Recent work focused mostly on user preference and performance of the different locomotion techniques.
This work is investigated whether and how quickly users can adapt to a hand gesture-based locomotion system in VR.
arXiv Detail & Related papers (2022-06-16T10:44:16Z) - Security and Privacy in Virtual Reality: A Literature Survey [0.0]
We explore the state-of-the-art in VR privacy and security, we categorise potential issues and threats, and we analyse causes and effects of the identified threats.<n>We focus on the research previously conducted in the field of authentication in VR, as it stands as the most investigated area in the topic.<n>We also provide an overview of other interesting uses of VR in the field of cybersecurity, such as the use of VR to teach cybersecurity or evaluate the usability of security solutions.
arXiv Detail & Related papers (2022-04-30T08:45:09Z) - Wireless Edge-Empowered Metaverse: A Learning-Based Incentive Mechanism
for Virtual Reality [102.4151387131726]
We propose a learning-based Incentive Mechanism framework for VR services in the Metaverse.
First, we propose the quality of perception as the metric for VR users in the virtual world.
Second, for quick trading of VR services between VR users (i.e., buyers) and VR SPs (i.e., sellers), we design a double Dutch auction mechanism.
Third, for auction communication reduction, we design a deep reinforcement learning-based auctioneer to accelerate this auction process.
arXiv Detail & Related papers (2021-11-07T13:02:52Z) - Robust Egocentric Photo-realistic Facial Expression Transfer for Virtual
Reality [68.18446501943585]
Social presence will fuel the next generation of communication systems driven by digital humans in virtual reality (VR)
The best 3D video-realistic VR avatars that minimize the uncanny effect rely on person-specific (PS) models.
This paper makes progress in overcoming these limitations by proposing an end-to-end multi-identity architecture.
arXiv Detail & Related papers (2021-04-10T15:48:53Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.