{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T21:57:42Z","timestamp":1761343062771,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":57,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819713318"},{"type":"electronic","value":"9789819713325"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-1332-5_23","type":"book-chapter","created":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T03:02:27Z","timestamp":1712026947000},"page":"287-305","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Security and Privacy Concerns on Metaverse"],"prefix":"10.1007","author":[{"given":"Kejiang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Tengfei","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Tongqing","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Chang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Fang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhiping","family":"Cai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,3]]},"reference":[{"key":"23_CR1","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/OJCS.2022.3188249","volume":"3","author":"Q Yang","year":"2022","unstructured":"Yang, Q., et al.: Fusing blockchain and AI with metaverse: A survey. IEEE Open Journal of the Computer Society 3, 122\u2013136 (2022)","journal-title":"IEEE Open Journal of the Computer Society"},{"key":"23_CR2","unstructured":"Stephenson, N.: Snow crash: A novel. Spectra (2003)"},{"key":"23_CR3","unstructured":"Lee, L.H., et al.: All one needs to know about metaverse: a complete survey on technological singularity, virtual ecosystem, and research agenda. Computers and Society (2021)"},{"issue":"12","key":"23_CR4","doi-asserted-by":"publisher","first-page":"771","DOI":"10.1038\/s43588-021-00174-0","volume":"1","author":"N Mohammadi","year":"2021","unstructured":"Mohammadi, N., Taylor, J.E.: Thinking fast and slow in disaster decision-making with Smart City Digital Twins. Nature Comput. Sci. 1(12), 771\u2013773 (2021)","journal-title":"Nature Comput. Sci."},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Grieves, M., Vickers, J.: Digital twin: Mitigating unpredictable, undesirable emergent behavior in complex systems. Transdisc. Perspect. Complex Syst. New Find. Approaches, 85\u2013113 (2017)","DOI":"10.1007\/978-3-319-38756-7_4"},{"key":"23_CR6","unstructured":"Leenes, R., Fischer-Huebner, S., Duquenoy, P., Zuccato, A., Martucci, L.: Privacy in the metaverse: regulating a complex social construct in a virtual world. In: FIDIS (2007)"},{"issue":"2","key":"23_CR7","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MTS.2018.2826060","volume":"37","author":"B Falchuk","year":"2018","unstructured":"Falchuk, B., Loeb, S., Neff, R.: The social metaverse: Battle for privacy. IEEE Technol. Soc. Maga. 37(2), 52\u201361 (2018)","journal-title":"IEEE Technol. Soc. Maga."},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Hu, P., Li, H., Fu, H., Cansever, D., Mohapatra, P.: Dynamic defense strategy against advanced persistent threat with insiders. In: International Conference on Computer Communications (2015)","DOI":"10.1109\/INFOCOM.2015.7218444"},{"key":"23_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2480741.2480751","volume":"45","author":"JDN Dionisio","year":"2013","unstructured":"Dionisio, J.D.N., Burns, W.G., Gilbert, R.L.: 3d virtual worlds and the metaverse: current status and future possibilities. ACM Comput. Surv. 45, 1\u201338 (2013)","journal-title":"ACM Comput. Surv."},{"issue":"1","key":"23_CR10","doi-asserted-by":"publisher","first-page":"e1752","DOI":"10.1002\/cav.1752","volume":"29","author":"KJL Nevelsteen","year":"2018","unstructured":"Nevelsteen, K.J.L.: Virtual world, defined from a technological perspective and applied to video games, mixed reality, and the Metaverse. Comput. Animat. Virtual Worlds 29(1), e1752 (2018)","journal-title":"Comput. Animat. Virtual Worlds"},{"key":"23_CR11","doi-asserted-by":"publisher","first-page":"14671","DOI":"10.1109\/JIOT.2023.3278329","volume":"10","author":"H Ning","year":"2023","unstructured":"Ning, H., et al.: A survey on the metaverse: the state-of-the-art, technologies, applications, and challenges. IEEE Internet Things J. 10, 14671\u201314688 (2023)","journal-title":"IEEE Internet Things J."},{"key":"23_CR12","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/s10660-009-9030-8","volume":"9","author":"M Bourlakis","year":"2009","unstructured":"Bourlakis, M., Papagiannidis, S., Li, F.: Retail spatial evolution: paving the way from traditional to metaverse retailing. Electron. Commer. Res. 9, 135\u2013148 (2009)","journal-title":"Electron. Commer. Res."},{"issue":"15","key":"23_CR13","doi-asserted-by":"publisher","first-page":"94","DOI":"10.3991\/ijet.v15i15.13025","volume":"15","author":"J D\u00edaz","year":"2020","unstructured":"D\u00edaz, J., Salda\u00f1a, C., Avila, C.: Virtual world as a resource for hybrid education. Int. J. Emerg. Technol. Learn. (iJET) 15(15), 94\u2013109 (2020)","journal-title":"Int. J. Emerg. Technol. Learn. (iJET)"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Duan, H., et al.: Metaverse for social good: a university campus prototype. In: Proceedings of the 29th ACM International Conference on Multimedia (2021)","DOI":"10.1145\/3474085.3479238"},{"key":"23_CR15","doi-asserted-by":"publisher","first-page":"4209","DOI":"10.1109\/ACCESS.2021.3140175","volume":"10","author":"SM Park","year":"2022","unstructured":"Park, S.M., Kim, Y.G.: A metaverse: taxonomy, components, applications, and open challenges. IEEE Access 10, 4209\u20134251 (2022)","journal-title":"IEEE Access"},{"key":"23_CR16","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1109\/COMST.2022.3202047","volume":"25","author":"Y Wang","year":"2022","unstructured":"Wang, Y., Su, Z., Zhang, N., Xing, R., Liu, D., Luan, T.H., Shen, X.: A survey on metaverse: fundamentals, security, and privacy. IEEE Commun. Surv. Tutor. 25, 319\u2013352 (2022)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"23_CR17","unstructured":"Janin, A.L., Mizell, D.W., Caudell, T.P.: Calibration of head-mounted display for augmented reality applications. In: Virtual Reality Annual International Symposium, 1993. IEEE (1993)"},{"key":"23_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3359626","volume":"52","author":"JA de Guzman","year":"2019","unstructured":"de Guzman, J.A., Thilakarathna, K., Seneviratne, A.: Security and privacy approaches in mixed reality: a literature survey. ACM Comput. Surv. 52, 1\u201337 (2019)","journal-title":"ACM Comput. Surv."},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"de Guzman, J.A., Seneviratne, A., Thilakarathna, K.: Unravelling spatial privacy risks of mobile mixed reality data. In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (2021)","DOI":"10.1145\/3448103"},{"key":"23_CR20","unstructured":"Sikder, A.K., Petracca, G., Aksu, H., Jaeger, T., Uluagac, A.S.: A survey on sensor-based threats to internet-of-things (iot) devices and applications. Cryptography and Security (2018)"},{"key":"23_CR21","doi-asserted-by":"crossref","unstructured":"Pan, Z., Cheok, A.D., Yang, H., Zhu, J., Shi, J.: Virtual reality and mixed reality for virtual learning environments. Comput. Graph. 30(1), 20\u201328 (2006)","DOI":"10.1016\/j.cag.2005.10.004"},{"key":"23_CR22","unstructured":"Lau, F., Rubin, S., Smith, M., Trajkovic, L.: Distributed denial of service attacks. In: Systems Man and Cybernetics (2000)"},{"key":"23_CR23","unstructured":"Schwarcz, D.: Transparently opaque: understanding the lack of transparency in insurance consumer protection. Social Sci. Res. Netw. (2013)"},{"key":"23_CR24","unstructured":"Shostack, A.: Elevation of privilege: drawing developers into threat modeling. In: Genetics Selection Evolution (2014)"},{"key":"23_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/11801412_8","volume-title":"Secure Mobile Ad-hoc Networks and Sensors","author":"M Barbeau","year":"2006","unstructured":"Barbeau, M., Hall, J., Kranakis, E.: Detecting impersonation attacks in future wireless and mobile networks. In: Burmester, M., Yasinsac, A. (eds.) MADNES 2005. LNCS, vol. 4074, pp. 80\u201395. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11801412_8"},{"key":"23_CR26","doi-asserted-by":"crossref","unstructured":"Gulhane, A., et al.: Security, privacy and safety risk assessment for virtual reality learning environment applications. In: Consumer Communications and Networking Conference (2019)","DOI":"10.1109\/CCNC.2019.8651847"},{"issue":"2","key":"23_CR27","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1109\/TDSC.2019.2907942","volume":"18","author":"P Casey","year":"2019","unstructured":"Casey, P., Baggili, I., Yarramreddy, A.: Immersive virtual reality attacks and the human joystick. IEEE Trans. Depend. Secure Comput. 18(2), 550\u2013562 (2019)","journal-title":"IEEE Trans. Depend. Secure Comput."},{"issue":"6","key":"23_CR28","doi-asserted-by":"publisher","first-page":"4127","DOI":"10.1109\/TDSC.2021.3121216","volume":"19","author":"S Valluripally","year":"2021","unstructured":"Valluripally, S., Gulhane, A., Hoque, K.A., Calyam, P.: Modeling and defense of social virtual reality attacks inducing cybersickness. IEEE Trans. Depend. Secure Comput. 19(6), 4127\u20134144 (2021)","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"23_CR29","doi-asserted-by":"crossref","unstructured":"Lebeck, K., Ruth, K., Kohno, T., Roesner, F.: Towards security and privacy for multi-user augmented reality: foundations with end users. In: IEEE Symposium on Security and Privacy (2018)","DOI":"10.1109\/SP.2018.00051"},{"key":"23_CR30","volume-title":"Augmented Reality: Principles and Practice","author":"D Schmalstieg","year":"2016","unstructured":"Schmalstieg, D., Hollerer, T.: Augmented Reality: Principles and Practice. Addison-Wesley Professional, Boston (2016)"},{"key":"23_CR31","doi-asserted-by":"crossref","unstructured":"Hasan, R., Saxena, N., Haleviz, T., Zawoad, S., Rinehart, D.: Sensing-enabled channels for hard-to-detect command and control of mobile devices. In: Computer and Communications Security (2013)","DOI":"10.1145\/2484313.2484373"},{"key":"23_CR32","unstructured":"Deshotels, L.: Inaudible sound as a covert channel in mobile devices. In: WOOT\u201914 Proceedings of the 8th USENIX conference on Offensive Technologies (2014)"},{"key":"23_CR33","doi-asserted-by":"crossref","unstructured":"Subramanian, V., Uluagac, S., Cam, H., Beyah, R.: Examining the characteristics and implications of sensor side channels. In: International Conference on Communications (2013)","DOI":"10.1109\/ICC.2013.6654855"},{"key":"23_CR34","doi-asserted-by":"crossref","unstructured":"Figueiredo, L.S., Livshits, B., Molnar, D., Veanes, M.: Prepose: privacy, security, and reliability for gesture-based programming. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 122\u2013137. IEEE (2016)","DOI":"10.1109\/SP.2016.16"},{"issue":"6","key":"23_CR35","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010\u20131027 (2001)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"23_CR36","doi-asserted-by":"crossref","unstructured":"Yan, F., Zhang, H., Zhao, B.: A secure multi-party computing model based on trusted computing platform. In: 2009 Ninth IEEE International Conference on Computer and Information Technology, vol. 2, pp. 318\u2013322. IEEE (2009)","DOI":"10.1109\/CIT.2009.99"},{"issue":"3","key":"23_CR37","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2020.2975749","volume":"37","author":"T Li","year":"2020","unstructured":"Li, T., Sahu, A.K., Talwalkar, A., Smith, V.: Federated learning: challenges, methods, and future directions. IEEE Signal Process. Mag. 37(3), 50\u201360 (2020)","journal-title":"IEEE Signal Process. Mag."},{"key":"23_CR38","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Symposium on the Theory of Computing (2009)","DOI":"10.1145\/1536414.1536440"},{"key":"23_CR39","doi-asserted-by":"crossref","unstructured":"George, C., et al.: Seamless and secure vr: adapting and evaluating established authentication systems for virtual reality. In: NDSS (2017)","DOI":"10.14722\/usec.2017.23028"},{"key":"23_CR40","doi-asserted-by":"crossref","unstructured":"Gaebel, E., Zhang, N., Lou, W., Hou, Y.T.: Looks good to me: authentication for augmented reality. In Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, pp. 57\u201367 (2016)","DOI":"10.1145\/2995289.2995295"},{"key":"23_CR41","doi-asserted-by":"crossref","unstructured":"Pearson, J., et al.: Chameleon devices: investigating more secure and discreet mobile interactions via active camouflaging. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 5184\u20135196 (2017)","DOI":"10.1145\/3025453.3025482"},{"key":"23_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/978-3-319-10879-7_15","volume-title":"Security and Cryptography for Networks","author":"AG Forte","year":"2014","unstructured":"Forte, A.G., Garay, J.A., Jim, T., Vahlis, Y.: EyeDecrypt \u2014 private interactions in plain sight. In: Abdalla, M., De Prisco, R. (eds.) SCN 2014. LNCS, vol. 8642, pp. 255\u2013276. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10879-7_15"},{"key":"23_CR43","doi-asserted-by":"crossref","unstructured":"Maloney, D., Zamanifard, S., Freeman, G.: Anonymity vs. familiarity: self-disclosure and privacy in social virtual reality. Virtual Reality Softw. Technol. (2020)","DOI":"10.1145\/3385956.3418967"},{"key":"23_CR44","unstructured":"Ruth, K., Kohno, T., Roesner, F.: Secure multi-user content sharing for augmented reality applications. In: Usenix Security Symposium (2019)"},{"issue":"1","key":"23_CR45","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/775265.775268","volume":"8","author":"BW Lampson","year":"1974","unstructured":"Lampson, B.W.: Protection. ACM SIGOPS Oper. Syst. Rev. 8(1), 18\u201324 (1974)","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"key":"23_CR46","unstructured":"Sikder, A.K., Aksu, H., Uluagac, A.S.: 6thsense: a context-aware sensor-based attack detector for smart devices. In: Usenix Security Symposium (2017)"},{"key":"23_CR47","doi-asserted-by":"crossref","unstructured":"Zafar, Y., Har, D.: A novel countermeasure enhancing side channel immunity in FPGAs. In: 2008 International Conference on Advances in Electronics and Micro-Electronics (2008)","DOI":"10.1109\/ENICS.2008.11"},{"key":"23_CR48","unstructured":"Giuseppe, P., Lisa, M.M., Ananthram, S., Trent, J.: Agility maneuvers to mitigate inference attacks on sensed location data. In: IEEE Conference Proceedings (2016)"},{"key":"23_CR49","doi-asserted-by":"crossref","unstructured":"Lebeck, K., et al.: Securing augmented reality output. In: 2017 IEEE Symposium on Security and Privacy (SP). IEEE (2017)","DOI":"10.1109\/SP.2017.13"},{"key":"23_CR50","doi-asserted-by":"crossref","unstructured":"Ahn, S., Gorlatova, M., Naghizadeh, P., Chiang, M., Mittal, P.: Adaptive fog-based output security for augmented reality. In: ACM Special Interest Group on Data Communication (2018)","DOI":"10.1145\/3229625.3229626"},{"key":"23_CR51","doi-asserted-by":"crossref","unstructured":"Wang, X., Yang, Y., Zeng, Y., Tang, C., Shi, J., Xu, K.: A novel hybrid mobile malware detection system integrating anomaly detection with misuse detection (2015)","DOI":"10.1145\/2802130.2802132"},{"key":"23_CR52","doi-asserted-by":"crossref","unstructured":"Sundarkumar, G.G., Ravi, V., Nwogu, I., Govindaraju, V.: Malware detection via api calls, topic models and machine learning. In: Conference on Automation Science and Engineering (2015)","DOI":"10.1109\/CoASE.2015.7294263"},{"issue":"3","key":"23_CR53","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/MIC.2021.3057756","volume":"25","author":"V Almeida","year":"2021","unstructured":"Almeida, V., Filgueiras, F., Doneda, D.: The ecosystem of digital content governance. IEEE Internet Comput. 25(3), 13\u201317 (2021)","journal-title":"IEEE Internet Comput."},{"key":"23_CR54","doi-asserted-by":"crossref","unstructured":"Woo, G., Lippman, A., Raskar, R.: Vrcodes: unobtrusive and active visual codes for interaction by exploiting rolling shutter. In: 2012 IEEE International Symposium on Mixed and Augmented Reality (ISMAR), pp. 59\u201364. IEEE (2012)","DOI":"10.1109\/ISMAR.2012.6402539"},{"key":"23_CR55","doi-asserted-by":"crossref","unstructured":"Lebeck, K., et al.: Towards security and privacy for multi-user augmented reality: foundations with end users. In: 2018 IEEE Symposium on Security and Privacy (SP). IEEE (2018)","DOI":"10.1109\/SP.2018.00051"},{"key":"23_CR56","doi-asserted-by":"crossref","unstructured":"Sun, M., Zheng, M., Lui, J.C.S., Jiang, X.: Design and implementation of an android host-based intrusion prevention system. In: Annual Computer Security Applications Conference (2014)","DOI":"10.1145\/2664243.2664245"},{"key":"23_CR57","doi-asserted-by":"crossref","unstructured":"Wu, W.-C., Hung, S.-H.: Droiddolphin: a dynamic android malware detection framework using big data and machine learning. In: Research in Adaptive and Convergent Systems (2014)","DOI":"10.1145\/2663761.2664223"}],"container-title":["Communications in Computer and Information Science","Computer Networks and IoT"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-1332-5_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T21:51:53Z","timestamp":1761342713000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-1332-5_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819713318","9789819713325"],"references-count":57,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-1332-5_23","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"3 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}