{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:32:21Z","timestamp":1776112341542,"version":"3.50.1"},"reference-count":38,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2014,4,1]],"date-time":"2014-04-01T00:00:00Z","timestamp":1396310400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0846065, CNS-0905384"],"award-info":[{"award-number":["CNS-0846065, CNS-0905384"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Graduate Research Fellowship","award":["DGE-0718124"],"award-info":[{"award-number":["DGE-0718124"]}]},{"DOI":"10.13039\/100006112","name":"Microsoft Research","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006112","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2014,4]]},"abstract":"<jats:p>\n            AR systems pose potential security concerns that should be addressed\n            <jats:italic>before<\/jats:italic>\n            the systems become widespread.\n          <\/jats:p>","DOI":"10.1145\/2580723.2580730","type":"journal-article","created":{"date-parts":[[2014,3,24]],"date-time":"2014-03-24T13:45:50Z","timestamp":1395668750000},"page":"88-96","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":225,"title":["Security and privacy for augmented reality systems"],"prefix":"10.1145","volume":"57","author":[{"given":"Franziska","family":"Roesner","sequence":"first","affiliation":[{"name":"University of Washington, Seattle"}]},{"given":"Tadayoshi","family":"Kohno","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle"}]},{"given":"David","family":"Molnar","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA"}]}],"member":"320","published-online":{"date-parts":[[2014,4]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1162\/pres.1997.6.4.355"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/38.963459"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.20"},{"key":"e_1_2_1_4_1","volume-title":"This apple patent will shut down your camera at live concerts","author":"Business Insider","year":"2011","unstructured":"Business Insider . This apple patent will shut down your camera at live concerts ; http:\/\/www.businessinsider.com\/iphone-concert-patent- 2011 -6. Business Insider. This apple patent will shut down your camera at live concerts; http:\/\/www.businessinsider.com\/iphone-concert-patent-2011-6."},{"key":"e_1_2_1_5_1","unstructured":"CNN. Augmented-reality windshields and the future of driving 2012; http:\/\/virtual.vtt.fi\/virtual\/proj2\/multimedia\/alvar.html.  CNN. Augmented-reality windshields and the future of driving 2012; http:\/\/virtual.vtt.fi\/virtual\/proj2\/multimedia\/alvar.html."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00437-7_3"},{"key":"e_1_2_1_7_1","volume-title":"Proceedings of USENIX Workshop on Hot Topics in Operating Systems","author":"D'Antoni L.","year":"2013","unstructured":"D'Antoni , L. , Dunn , A. , Jana , S. , Operating system support for augmented reality applications . In Proceedings of USENIX Workshop on Hot Topics in Operating Systems ( 2013 ). D'Antoni, L., Dunn, A., Jana, S., et al. Operating system support for augmented reality applications. In Proceedings of USENIX Workshop on Hot Topics in Operating Systems (2013)."},{"key":"e_1_2_1_8_1","volume-title":"Crowdsourcing road congestion data","author":"Google","year":"2009","unstructured":"Google . Crowdsourcing road congestion data ; http:\/\/googleblog.blogspot.com\/ 2009 \/08\/bright-side-of-sitting-in-traffic.html. Google. Crowdsourcing road congestion data; http:\/\/googleblog.blogspot.com\/2009\/08\/bright-side-of-sitting-in-traffic.html."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029179.1029183"},{"key":"e_1_2_1_10_1","unstructured":"Harvey A. CVDazzle: Camouflage from Computer Vision; http:\/\/cvdazzle.com\/.  Harvey A. CVDazzle: Camouflage from Computer Vision; http:\/\/cvdazzle.com\/."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR.2005.32"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/T-AFFC.2012.11"},{"key":"e_1_2_1_13_1","volume-title":"The Mp3 Experiments","author":"Improv Everywhere","year":"2012","unstructured":"Improv Everywhere . The Mp3 Experiments , 2012 ; http:\/\/improveverywhere.com\/missions\/the-mp3-experiments\/. Improv Everywhere. The Mp3 Experiments, 2012; http:\/\/improveverywhere.com\/missions\/the-mp3-experiments\/."},{"key":"e_1_2_1_14_1","volume-title":"Proceedings of the 4th USENIX Workshop on Hot Topics in Security","author":"Jakobsson M.","year":"2009","unstructured":"Jakobsson , M. , Shi , E. , Golle , P. , and Chow , R . Implicit authentication for mobile devices . In Proceedings of the 4th USENIX Workshop on Hot Topics in Security ( 2009 ), USENIX. Jakobsson, M., Shi, E., Golle, P., and Chow, R. Implicit authentication for mobile devices. In Proceedings of the 4th USENIX Workshop on Hot Topics in Security (2009), USENIX."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/857202.858134"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8659.2007.00945.x"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2184489.2184510"},{"key":"e_1_2_1_20_1","volume-title":"Kinect for Windows","author":"Microsoft","year":"2012","unstructured":"Microsoft . Kinect for Windows , 2012 ; http:\/\/www.microsoft.com\/en-us\/kinectforwindows\/. Microsoft. Kinect for Windows, 2012; http:\/\/www.microsoft.com\/en-us\/kinectforwindows\/."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1002\/cav.v19:1"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2009.5210042"},{"key":"e_1_2_1_24_1","volume-title":"Hackers assault epilepsy patients via computer. Wired (2008)","author":"Poulsen K.","year":"2008","unstructured":"Poulsen , K. Hackers assault epilepsy patients via computer. Wired (2008) ; http:\/\/www.wired.com\/politics\/security\/news\/ 2008 \/03\/epilepsy. Poulsen, K. Hackers assault epilepsy patients via computer. Wired (2008); http:\/\/www.wired.com\/politics\/security\/news\/2008\/03\/epilepsy."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046769"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISAR.2001.970521"},{"key":"e_1_2_1_27_1","volume-title":"Proceedings of the 21st USENIX Security Symposium","author":"Riva O.","year":"2012","unstructured":"Riva , O. , Qin , C. , Strauss , K. , And Lymberopoulos , D. Progressive authentication : Deciding when to authenticate on mobile phones . In Proceedings of the 21st USENIX Security Symposium ( 2012 ). Riva, O., Qin, C., Strauss, K., And Lymberopoulos, D. Progressive authentication: Deciding when to authenticate on mobile phones. In Proceedings of the 21st USENIX Security Symposium (2012)."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.24"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1622176.1622208"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1734583.1734593"},{"key":"e_1_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Schiff J. Meingast M. Mulligan D.K. Sastry S. and Goldberg K.Y. Respectful cameras: Detecting visual markers in real-time to address privacy concerns. In Proceeding of the 2007 Int'l Conference on Intelligent Robots and Systems.  Schiff J. Meingast M. Mulligan D.K. Sastry S. and Goldberg K.Y. Respectful cameras: Detecting visual markers in real-time to address privacy concerns. In Proceeding of the 2007 Int'l Conference on Intelligent Robots and Systems .","DOI":"10.1109\/IROS.2007.4399122"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/325737.325864"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1476589.1476686"},{"key":"e_1_2_1_34_1","volume-title":"Placeraider: Virtual theft in physical spaces with smartphones. CoRR abs\/1209.5982","author":"Templeman R.","year":"2012","unstructured":"Templeman , R. , Rahman , Z. , Crandall , D.J. , And Kapadia , A. Placeraider: Virtual theft in physical spaces with smartphones. CoRR abs\/1209.5982 ( 2012 ). Templeman, R., Rahman, Z., Crandall, D.J., And Kapadia, A. Placeraider: Virtual theft in physical spaces with smartphones. CoRR abs\/1209.5982 (2012)."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/11551201_5"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.20870\/IJVR.2010.9.2.2767"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000013087.49260.fb"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1006610329284"},{"key":"e_1_2_1_39_1","volume-title":"Alvar Software Library","author":"Technical Research Centre Of","year":"2009","unstructured":"VTT Technical Research Centre Of Finland. Alvar Software Library , 2009 . http:\/\/cnn.com\/2012\/01\/13\/tech\/innovation\/ces-future-driving\/. VTT Technical Research Centre Of Finland. Alvar Software Library, 2009. http:\/\/cnn.com\/2012\/01\/13\/tech\/innovation\/ces-future-driving\/."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/11428572_13"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR.2008.4637362"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2580723.2580730","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2580723.2580730","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:10:19Z","timestamp":1750234219000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2580723.2580730"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4]]},"references-count":38,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,4]]}},"alternative-id":["10.1145\/2580723.2580730"],"URL":"https:\/\/doi.org\/10.1145\/2580723.2580730","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"value":"0001-0782","type":"print"},{"value":"1557-7317","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,4]]},"assertion":[{"value":"2014-04-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}