skip to main content
research-article
Free Access

Security and privacy for augmented reality systems

Published:01 April 2014Publication History
Skip Abstract Section

Abstract

AR systems pose potential security concerns that should be addressed before the systems become widespread.

References

  1. Azuma, R.T. A survey of augmented reality. Presence: Teleoperators and Virtual Environments 6 (1997), 355--385.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Azuma, R., Baillot, Y., Behringer, R., Feiner, S., Julier, S. and Macintyre, B. Recent advances in augmented reality. IEEE Computer Graphics and Applications 21, 6 (2001), 34--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Backes, M., Chen, T., Duermuth, M., Lensch, H. and Welk, M. Tempest in a teapot: Compromising reflections revisited. IEEE Symposium on Security and Privacy (2009). Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Business Insider. This apple patent will shut down your camera at live concerts; http://www.businessinsider.com/iphone-concert-patent-2011-6.Google ScholarGoogle Scholar
  5. CNN. Augmented-reality windshields and the future of driving, 2012; http://virtual.vtt.fi/virtual/proj2/multimedia/alvar.html.Google ScholarGoogle Scholar
  6. Costanza, E., Kunz, A. and Fjeld, M. Mixed reality: A survey. Human Machine Interaction. Springer-Verlag, 2009, 47--68. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. D'Antoni, L., Dunn, A., Jana, S., et al. Operating system support for augmented reality applications. In Proceedings of USENIX Workshop on Hot Topics in Operating Systems (2013). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Google. Crowdsourcing road congestion data; http://googleblog.blogspot.com/2009/08/bright-side-of-sitting-in-traffic.html.Google ScholarGoogle Scholar
  9. Halderman, J.A., Waters, B. and Felten, E.W. Privacy management for portable recording devices. In Proceedings of the 3rd ACM Workshop on Privacy in Electronic Society (2004). Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Harvey, A. CVDazzle: Camouflage from Computer Vision; http://cvdazzle.com/.Google ScholarGoogle Scholar
  11. Henrysson, A., Billinghurst, M., And Ollila, M. Face to face collaborative AR on mobile phones. In Proceeding of the 4th IEEE/ACM International Symposium on Mixed & Augmented Reality (2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Hoque, M.E., McDuff, D. and Picard, R.W. Exploring temporal patterns in classifying frustrated and delighted smiles. IEEE Transactions on Affective Computing 3 (2012), 323--334.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Improv Everywhere. The Mp3 Experiments, 2012; http://improveverywhere.com/missions/the-mp3-experiments/.Google ScholarGoogle Scholar
  14. Jakobsson, M., Shi, E., Golle, P., and Chow, R. Implicit authentication for mobile devices. In Proceedings of the 4th USENIX Workshop on Hot Topics in Security (2009), USENIX. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Jana, S., Molnar, D., Moshchuk, A. et al. Enabling fine-grained permissions for augmented reality applications with recognizers. Tech. Rep. MSRTR-2013-11, Microsoft Research, Feb. 2013.Google ScholarGoogle Scholar
  16. Kato, H. and Billinghurst, M. Marker tracking and HMD calibration for a video-based augmented reality conferencing system. In IEEE/ACM Workshop on Augmented Reality (1999). Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Laycock, S. and Day, A. A survey of haptic rendering techniques. Comp. Graphics Forum. 26, 1 (2007), 50--65.Google ScholarGoogle ScholarCross RefCross Ref
  18. Madejski, M., Johnson, M. and Bellovin, S.M. The Failure of Online Social Network Privacy Settings. Tech. Rep. CUCS-010-11, Dept. of Comp. Science, Columbia University, 2011.Google ScholarGoogle Scholar
  19. Maganis, G., Jung, J., Kohno, T. et al. Sensor Tricorder: What does that sensor know about me? In Proceedings of the 12th Workshop on Mobile Computing Systems and Applications (2011), ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Microsoft. Kinect for Windows, 2012; http://www.microsoft.com/en-us/kinectforwindows/.Google ScholarGoogle Scholar
  21. Miller, M.S. Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control. Ph.D. thesis. Johns Hopkins University, Baltimore, MD, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Papagiannakis, G., Singh, G. and Magnenatthalmann, N. A survey of mobile and wireless technologies for augmented reality systems. Computer Animation and Virtual Worlds 19 (2008), 3--22. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Parviz, B. For your eye only. IEEE Spectrum 46 (2009), 36--41. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Poulsen, K. Hackers assault epilepsy patients via computer. Wired (2008); http://www.wired.com/politics/security/news/2008/03/epilepsy.Google ScholarGoogle Scholar
  25. Raguram, R., White, A.M., Goswami, D. et al. iSpy: automatic reconstruction of typed input from compromising reflections. In Proceedings of the 18th ACM Conf. Computer and Communications Security. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Reitmayr, G. and Schmalstieg, D. Mobile collaborative augmented reality. In Proceedings of the 4th International Symp. on Augmented Reality (2001).Google ScholarGoogle ScholarCross RefCross Ref
  27. Riva, O., Qin, C., Strauss, K., And Lymberopoulos, D. Progressive authentication: Deciding when to authenticate on mobile phones. In Proceedings of the 21st USENIX Security Symposium (2012). Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Roesner, F., Kohno, T., Moshchuk, A. et al. User-driven access control: Rethinking permission granting in modern operating systems. IEEE Symposium on Security and Privacy (2012). Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Saponas, T.S., Tan, D.S., Morris, D. et al. Enabling always-available input with muscle-computer interfaces. In Proceedings of the 22nd ACM Symposium on User Interface Software and Technology (2009). Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Saroiu, S. and Wolman, A. I am a sensor, and I approve this message. In Proceedings of the 11th Workshop on Mobile Computing Systems and Applications (2010), ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Schiff, J., Meingast, M., Mulligan, D.K., Sastry, S. and Goldberg, K.Y. Respectful cameras: Detecting visual markers in real-time to address privacy concerns. In Proceeding of the 2007 Int'l Conference on Intelligent Robots and Systems.Google ScholarGoogle Scholar
  32. Starner, T., Leibe, B., Singletary, B. and Pair, J. Mindwarping: Towards creating a compelling collaborative augmented reality game. In ACM Intelligent User Interfaces (2000). Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Sutherland, I.E. A head-mounted three-dimensional display. In Proceedings of the Fall Joint Computer Conference, American Federation of Information Processing Societies (1968). Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Templeman, R., Rahman, Z., Crandall, D.J., And Kapadia, A. Placeraider: Virtual theft in physical spaces with smartphones. CoRR abs/1209.5982 (2012).Google ScholarGoogle Scholar
  35. Truong, K., Patel, S., Summet, J. and Abowd, G. Preventing camera recording by designing a capture-resistant environment. Proceedings of Ubicomp (2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Van Krevelen, D. and Poelman, R. A survey of augmented reality technologies, applications, and limitations. The International Journal of Virtual Reality 9 (2010), 1--20.Google ScholarGoogle ScholarCross RefCross Ref
  37. Viola, P. and Jones, M. Robust real-time object detection. International Journal of Computer Vision 57 (2004), 137--154, Hingham, MA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Vrij, A., Edward, K., Roberts, K. and Bull, R. Detecting deceit via analysis of verbal and nonverbal behavior. Journal of Nonverbal Behavior 24 (2000), 239--263.Google ScholarGoogle ScholarCross RefCross Ref
  39. VTT Technical Research Centre Of Finland. Alvar Software Library, 2009. http://cnn.com/2012/01/13/tech/innovation/ces-future-driving/.Google ScholarGoogle Scholar
  40. Wagner, D., Pintaric, T., Ledermann, F. and Schmalstieg, D. Towards massively multi-user augmented reality on handheld devices. In Proceedings of the 3rd International Conference on Pervasive Computing (2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Zhou, F., Duh, H. B.-L. and Billinghurst, M. Trends in augmented reality tracking, interaction and display: A review of 10 years of ISMAR. In Proceedings of the 7th IEEE/ACM International Symposium on Mixed and Augmented Reality (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Security and privacy for augmented reality systems

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image Communications of the ACM
              Communications of the ACM  Volume 57, Issue 4
              April 2014
              97 pages
              ISSN:0001-0782
              EISSN:1557-7317
              DOI:10.1145/2580723
              • Editor:
              • Moshe Y. Vardi
              Issue’s Table of Contents

              Copyright © 2014 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 April 2014

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
              • Popular
              • Refereed

            PDF Format

            View or Download as a PDF file.

            PDFChinese translation

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format .

            View HTML Format