TY - CHAP
T1 - Security and Privacy of Augmented Reality Systems
AU - Shang, Jiacheng
N1 - Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2024.
PY - 2024
Y1 - 2024
N2 - Augmented Reality (AR) is a type of system that can enhance user perception by overlaying computer-generated content over real-world scenes, making them increasingly popular among mass consumers, in industry, and even in military training. In order to support immersive and realistic user experience, AR systems rely on real-time sensing through various types of sensors to understand the physical environment, make intelligent decisions, and render virtual objects in a well-managed way. However, recent studies on AR show that existing AR systems have many vulnerabilities, which attackers can leverage to manipulate AR applications or infer sensitive information about AR users. This chapter will research the literature on AR systems’ security and privacy. Specifically, this chapter will focus on input security, input privacy, and output security of excising AR systems. Vulnerabilities and existing countermeasures are discussed under each topic.
AB - Augmented Reality (AR) is a type of system that can enhance user perception by overlaying computer-generated content over real-world scenes, making them increasingly popular among mass consumers, in industry, and even in military training. In order to support immersive and realistic user experience, AR systems rely on real-time sensing through various types of sensors to understand the physical environment, make intelligent decisions, and render virtual objects in a well-managed way. However, recent studies on AR show that existing AR systems have many vulnerabilities, which attackers can leverage to manipulate AR applications or infer sensitive information about AR users. This chapter will research the literature on AR systems’ security and privacy. Specifically, this chapter will focus on input security, input privacy, and output security of excising AR systems. Vulnerabilities and existing countermeasures are discussed under each topic.
UR - http://www.scopus.com/inward/record.url?scp=85200462028&partnerID=8YFLogxK
U2 - 10.1007/978-3-031-53510-9_11
DO - 10.1007/978-3-031-53510-9_11
M3 - Chapter
AN - SCOPUS:85200462028
T3 - Advances in Information Security
SP - 305
EP - 330
BT - Advances in Information Security
PB - Springer
ER -