New Research Reveals that VR is Susceptible To Getting Hacked

    Published on:

    Virtual reality and augmented reality, two increasingly popular technologies, are said to dominate the upcoming new era of cyberspace, and most of us are addicted to novelty digital scopes, headset hardware, and interfaces. I started looking at it from a new perspective. Virtual keyboards can be dangerous giving hackers even more possibilities.

    Computer scientists at the University of California, Riverside have proven their findings. the study in two paperwill be exhibited at the annual international cybersecurity conference known as the Usenix Security Symposium.

    We’ve seen Facebook, Meta’s Mark Zuckerberg, and other tech industry giants working rapidly to develop Metaverse technology that utilizes hardware devices that detect physical gestures such as blinking, stepping, and nodding. I know In doing so, users will be able to explore the realm of virtual and augmented reality for gaming and establish new ways to meet and interact with new people and conduct commerce.

    Professors Nael Abu-Ghazaleh and Jiasi Chen from UCR’s computer team said that surveillance software can document and monitor all human movements and use AI to convert them into written words or text with 90 percent accuracy. proved. more.

    Abu Ghazaleh notes that if a user is running multiple software, one of which could be spyware, tracking the user’s activity in other applications could be used to detect software near the user or from the user. It claimed to be able to monitor the surrounding space, such as being able to check the distance of user. Hackers can also access the metaverse hardware her device and user interactions.

    Further on privacy risks, spyware can also track your personal data. When switching from one application to another and entering a password using the headset’s virtual keyboard. These hackers can use the same methods to access your body movements during virtual meetings and decode those movements to obtain sensitive information.

    Professors Chen and Abghazaleh, along with PhD student Yi Cheng Zhang, a CS PhD student at the University of California, Riverside, and a visiting assistant professor from Harvey Mudd College in Slocum, co-authored two research papers to be discussed at the conference.

    Zhang is the lead author of one of the papers titled “Everything is in the Head (Set): Side-Channel Attacks on AR/VR Systems”. This study delves into how malicious hackers exploit a user’s body movements, speech, and typing behavior on a virtual keyboard with over 90% accuracy. The research also provides insight into how these malicious actors monitor applications when users start them. Additionally, he describes how the headset can accurately determine the proximity of others to the user and achieve an accurate distance of 10.3 cm.

    Solcum is the lead author of a second research paper titled “Examining Behavior: AR/VR Keylogging from User Head Movements,” addressing more pressing concerns about the security threats posed by virtual keyboards. clarifying. The paper also explores how complex body gestures, such as the head movements of a headset-wearing user typing passwords into a virtual keyboard, are more than enough for these hackers to capture textual details. I’m explaining. The team then created his TyPose, a machine learning-based system that collects such gestures and movements and interprets them into letters and words as users type.

    These two research papers have one purpose. It is to alert the tech industry, which plans to incorporate the metaverse on a new scale, of the cybersecurity threats that come with it. Before publishing his research, Abu Ghazaleh worked to show the potential for these threats and provide much-needed transparency to give these tech giants a chance to address security issues. said.

    READ NEXT: Growing threats: How AI poses cybersecurity risks in 2023


    Leave a Reply

    Please enter your comment!
    Please enter your name here