{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:38:43Z","timestamp":1775230723821,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":92,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,29]],"date-time":"2023-10-29T00:00:00Z","timestamp":1698537600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,29]]},"DOI":"10.1145\/3586183.3606754","type":"proceedings-article","created":{"date-parts":[[2023,10,20]],"date-time":"2023-10-20T20:46:22Z","timestamp":1697834782000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":44,"title":["Going Incognito in the Metaverse: Achieving Theoretically Optimal Privacy-Usability Tradeoffs in VR"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0246-7045","authenticated-orcid":false,"given":"Vivek C","family":"Nair","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering and Computer Sciences, University of California, Berkeley, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0135-9432","authenticated-orcid":false,"given":"Gonzalo","family":"Munilla-Garrido","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Technical University of Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9745-6802","authenticated-orcid":false,"given":"Dawn","family":"Song","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Sciences, University of California, Berkeley, United States"}]}],"member":"320","published-online":{"date-parts":[[2023,10,29]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Brave Software Inc.2023. Brave. https:\/\/brave.com\/. Online; accessed 21 July 2022."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"crossref","unstructured":"Parastoo Abtahi Sidney\u00a0Q Hough James\u00a0A Landay and Sean Follmer. 2022. Beyond being real: a sensorimotor control perspective on interactions in virtual reality. 17\u00a0pages.","DOI":"10.1145\/3491102.3517706"},{"key":"e_1_3_2_2_3_1","volume-title":"Ethics Emerging: the Story of Privacy and Security Perceptions in Virtual Reality. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018","author":"Adams Devon","year":"2018","unstructured":"Devon Adams, Alseny Bah, Catherine Barwulor, Nureli Musaby, Kadeem Pitkin, and Elissa\u00a0M. Redmiles. 2018. Ethics Emerging: the Story of Privacy and Security Perceptions in Virtual Reality. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). USENIX Association, Baltimore, MD, 427\u2013442. https:\/\/www.usenix.org\/conference\/soups2018\/presentation\/adams"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1929820.1929828"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366550.3372253"},{"key":"e_1_3_2_2_6_1","volume-title":"https:\/\/beatsaber.com\/. Online","author":"Games Beat","year":"2022","unstructured":"Beat Games. 2023. Beat Saber. https:\/\/beatsaber.com\/. Online; accessed 13 July 2022."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3306212.3328138"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","unstructured":"Aaron Cahn Scott Alfeld Paul Barford and S. Muthukrishnan. 2016. An Empirical Study of Web Cookies. In Proceedings of the 25th International Conference on World Wide Web (Montr\u00e9al Qu\u00e9bec Canada) (WWW \u201916). International World Wide Web Conferences Steering Committee Republic and Canton of Geneva CHE 891\u2013901. https:\/\/doi.org\/10.1145\/2872427.2882991","DOI":"10.1145\/2872427.2882991"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/108844.108874"},{"key":"e_1_3_2_2_10_1","volume-title":"Percentile Data Files with LMS Values. https:\/\/www.cdc.gov\/growthcharts\/percentile_data_files.htm. Online","author":"Center of Disease Control and Prevention. 2022.","year":"2022","unstructured":"Center of Disease Control and Prevention. 2022. Percentile Data Files with LMS Values. https:\/\/www.cdc.gov\/growthcharts\/percentile_data_files.htm. Online; accessed 17 July 2022."},{"key":"e_1_3_2_2_11_1","unstructured":"Morning Consult. 2022. National Tracking Poll 2203015. 137\u00a0pages."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"crossref","unstructured":"Matthew Crain. 2021. Profit Over Privacy.","DOI":"10.5749\/j.ctv20zbktm"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.3758\/BF03337021"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2021.3067787"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","unstructured":"Jaybie\u00a0A. De\u00a0Guzman Kanchana Thilakarathna and Aruna Seneviratne. 2020. Security and Privacy Approaches in Mixed Reality: A Literature Survey. 37\u00a0pages. https:\/\/doi.org\/10.1145\/3359626","DOI":"10.1145\/3359626"},{"key":"e_1_3_2_2_16_1","unstructured":"Ellysse Dick. 2021. Balancing User Privacy and Innovation in Augmented and Virtual Reality. 28\u00a0pages."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"e_1_3_2_2_18_1","unstructured":"Neil\u00a0A Dodgson. 2004. Variation and extrema of human interpupillary distance. 36\u201346\u00a0pages."},{"key":"e_1_3_2_2_19_1","unstructured":"Duck Duck Go Inc.2023. Duck Duck Go. https:\/\/duckduckgo.com\/. Online; accessed 21 July 2022."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.689"},{"key":"e_1_3_2_2_21_1","volume-title":"Theory of Cryptography","author":"Dwork Cynthia","year":"1878","unstructured":"Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating Noise to Sensitivity in Private Data Analysis. In Theory of Cryptography, Shai Halevi and Tal Rabin (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 265\u2013284. https:\/\/link.springer.com\/chapter\/10.1007\/11681878_14 Online; accessed 30 December 2021."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","unstructured":"Steven Englehardt Dillon Reisman Christian Eubank Peter Zimmerman Jonathan Mayer Arvind Narayanan and Edward\u00a0W. Felten. 2015. Cookies That Give You Away: The Surveillance Implications of Web Tracking. 289\u2013299\u00a0pages. https:\/\/doi.org\/10.1145\/2736277.2741679","DOI":"10.1145\/2736277.2741679"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2018.2826060"},{"key":"e_1_3_2_2_25_1","unstructured":"Berserk Games. 2022. Tabletop Simulator. https:\/\/www.tabletopsimulator.com. Online."},{"key":"e_1_3_2_2_26_1","volume-title":"Valve and HTC Reveal Vive VR Headset. https:\/\/www.gamespot.com\/articles\/valve-and-htc-reveal-vive-vr-headset\/1100-6425606\/. Online","year":"2022","unstructured":"Gamespot. 2015. Valve and HTC Reveal Vive VR Headset. https:\/\/www.gamespot.com\/articles\/valve-and-htc-reveal-vive-vr-headset\/1100-6425606\/. Online; accessed 17 July 2022."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"crossref","unstructured":"Gonzalo\u00a0Munilla Garrido Vivek Nair and Dawn Song. 2023. SoK: Data Privacy in Virtual Reality.","DOI":"10.56553\/popets-2023-0045"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485983.3494859"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","unstructured":"Aniket Gulhane Akhil Vyas Reshmi Mitra Roland Oruche Gabriela Hoefer Samaikya Valluripally Prasad Calyam and Khaza\u00a0Anuarul Hoque. 2019. Security Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications. 9\u00a0pages. https:\/\/doi.org\/10.1109\/CCNC.2019.8651847","DOI":"10.1109\/CCNC.2019.8651847"},{"key":"e_1_3_2_2_30_1","volume-title":"Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018","author":"Habib Hana","year":"2018","unstructured":"Hana Habib, Jessica Colnago, Vidya Gopalakrishnan, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, and Lorrie\u00a0Faith Cranor. 2018. Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). USENIX Association, Baltimore, MD, 159\u2013175. https:\/\/www.usenix.org\/conference\/soups2018\/presentation\/habib-prying"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.715"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88428-4_26"},{"key":"e_1_3_2_2_33_1","volume-title":"https:\/\/hello.vrchat.com\/. Online","author":"VRChat Inc.","year":"2022","unstructured":"VRChat Inc.2022. VRChat. https:\/\/hello.vrchat.com\/. Online; accessed 17 May 2022."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3379157.3390512"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"crossref","unstructured":"Nesrine Kaaniche Maryline Laurent and Sana Belguith. 2020. Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey.","DOI":"10.1016\/j.jnca.2020.102807"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3093615"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376840"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","unstructured":"Fragkiskos Koufogiannis Shuo Han and George\u00a0J. Pappas. 2015. Optimality of the Laplace Mechanism in Differential Privacy. https:\/\/doi.org\/10.48550\/ARXIV.1504.00065","DOI":"10.48550\/ARXIV.1504.00065"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.3758\/BF03198740"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-42504-3_15"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386040"},{"key":"e_1_3_2_2_42_1","volume-title":"The Future of Identity in the","author":"Leenes Ronald","unstructured":"Ronald Leenes. 2008. Privacy in the Metaverse. In The Future of Identity in the Information Society, Simone Fischer-H\u00fcbner, Penny Duquenoy, Albin Zuccato, and Leonardo Martucci (Eds.). Springer US, Boston, MA, 95\u2013112."},{"key":"e_1_3_2_2_43_1","unstructured":"Jingjie Li Amrita\u00a0Roy Chowdhury Kassem Fawaz and Younghyun Kim. 2021. KalYou: Real-Time Privacy Control for Eye-Tracking Systems. 1793\u20131810\u00a0pages. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/li-jingjie"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","unstructured":"Sugang Li Ashwin Ashok Yanyong Zhang Chenren Xu Janne Lindqvist and Macro Gruteser. 2016. Whose move is it anyway? Authenticating smart wearable devices using unique head movement patterns. 9\u00a0pages. https:\/\/doi.org\/10.1109\/PERCOM.2016.7456514","DOI":"10.1109\/PERCOM.2016.7456514"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","unstructured":"Bin Liang Wei You Liangkun Liu Wenchang Shi and Mario Heiderich. 2014. Scriptless Timing Attacks on Web Browser Privacy. 112-123\u00a0pages. https:\/\/doi.org\/10.1109\/DSN.2014.93","DOI":"10.1109\/DSN.2014.93"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3519773"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","unstructured":"Ao Liu Lirong Xia Andrew Duchowski Reynold Bailey Kenneth Holmqvist and Eakta Jain. 2019. Differential Privacy for Eye-Tracking Data. 10\u00a0pages. https:\/\/doi.org\/10.1145\/3314111.3319823","DOI":"10.1145\/3314111.3319823"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385956.3418967"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385956.3418967"},{"key":"e_1_3_2_2_50_1","volume-title":"https:\/\/melonwiki.xyz\/. Online","author":"Melon Loader MelonLoader","year":"2022","unstructured":"MelonLoader community. 2022. Melon Loader. https:\/\/melonwiki.xyz\/. Online; accessed 22 July 2022."},{"key":"e_1_3_2_2_51_1","volume-title":"https:\/\/www.oculus.com\/horizon-worlds\/. Online","author":"Worlds Horizon","year":"2022","unstructured":"Meta. 2022. Horizon Worlds. https:\/\/www.oculus.com\/horizon-worlds\/. Online; accessed 17 May 2022."},{"key":"e_1_3_2_2_52_1","volume-title":"Oculus Go Features. https:\/\/www.oculus.com\/go\/features\/. Online","year":"2022","unstructured":"Meta. 2022. Oculus Go Features. https:\/\/www.oculus.com\/go\/features\/. Online; accessed 17 July 2022."},{"key":"e_1_3_2_2_53_1","volume-title":"https:\/\/altvr.com. Online","author":"VR.","year":"2022","unstructured":"Microsoft. 2022. AltspaceVR. https:\/\/altvr.com. Online; accessed 17 May 2022."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","unstructured":"Mark\u00a0Roman Miller Fernanda Herrera Hanseul Jun James\u00a0A. Landay and Jeremy\u00a0N. Bailenson. 2020. Personal identifiability of user tracking data during observation of 360-degree VR video. 17404\u00a0pages. https:\/\/doi.org\/10.1038\/s41598-020-74486-y","DOI":"10.1038\/s41598-020-74486-y"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","unstructured":"Robert Miller Natasha\u00a0Kholgade Banerjee and Sean Banerjee. 2022. Combining Real-World Constraints on User Behavior with Deep Neural Networks for Virtual Reality (VR) Biometrics. 409-418\u00a0pages. https:\/\/doi.org\/10.1109\/VR51125.2022.00060","DOI":"10.1109\/VR51125.2022.00060"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1476589.1476628"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382264"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656434.2656446"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180445.3180450"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/317456.317459"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","unstructured":"Stylianos Mystakidis. 2023. Metaverse. 486\u2013497\u00a0pages. https:\/\/doi.org\/10.3390\/encyclopedia2010031","DOI":"10.3390\/encyclopedia2010031"},{"key":"e_1_3_2_2_62_1","unstructured":"Vivek Nair. 2022. MetaGuard repository. https:\/\/github.com\/metaguard\/metaguard. Online."},{"key":"e_1_3_2_2_63_1","unstructured":"Vivek Nair Gonzalo\u00a0Munilla Garrido and Dawn Song. 2022. Exploring the Unprecedented Privacy Risks of the Metaverse. arxiv:2207.13176\u00a0[cs.CR]"},{"key":"e_1_3_2_2_64_1","unstructured":"Vivek Nair Wenbo Guo Justus Mattern Rui Wang James\u00a0F. O\u2019Brien Louis Rosenberg and Dawn Song. 2023. Unique Identification of 50 000+ Virtual Reality Users from Head & Hand Motion Data. arxiv:2302.08927\u00a0[cs.CR]"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","unstructured":"Fiachra O\u2019Brolch\u00e1in Tim Jacquemard David Monaghan Noel O\u2019Connor Peter Novitzky and Bert Gordijn. 2016. The Convergence of Virtual Reality and Social Networks: Threats to Privacy and Autonomy. 29\u00a0pages. https:\/\/doi.org\/10.1007\/s11948-014-9621-1","DOI":"10.1007\/s11948-014-9621-1"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","unstructured":"Fiachra O\u2019Brolch\u00e1in Tim Jacquemard David Monaghan Noel O\u2019Connor Peter Novitzky and Bert Gordijn. 2016. The Convergence of Virtual Reality and Social Networks: Threats to Privacy and Autonomy. 29\u00a0pages. https:\/\/doi.org\/10.1007\/s11948-014-9621-1","DOI":"10.1007\/s11948-014-9621-1"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300340"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"crossref","unstructured":"Ivan Poupyrev Mark Billinghurst Suzanne Weghorst and Tadao Ichikawa. 1996. The go-go interaction technique: non-linear mapping for direct manipulation in VR. 79\u201380\u00a0pages.","DOI":"10.1145\/237091.237102"},{"key":"e_1_3_2_2_69_1","unstructured":"Michael L.\u00a0Hicks published. 2022. Despite Quest 2 sales success Meta lost $10.2 billion on VR\/AR last year. https:\/\/www.androidcentral.com\/despite-quest-2-sales-success-meta-lost-102-billion-vrar-last-year"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","unstructured":"Daniel\u00a0E. Re Jillian J.\u00a0M. O\u2019Connor Patrick\u00a0J. Bennett and David\u00a0R. Feinberg. 2012. Preferences for Very Low and Very High Voice Pitch in Humans. e32719\u00a0pages. https:\/\/doi.org\/10.1371\/journal.pone.0032719","DOI":"10.1371\/journal.pone.0032719"},{"key":"e_1_3_2_2_71_1","volume-title":"The metaverse: Investing in the future now. https:\/\/www.blackrock.com\/us\/individual\/insights\/metaverse-investing-in-the-future. Online","author":"Rock Black","year":"2022","unstructured":"Black Rock. 2023. The metaverse: Investing in the future now. https:\/\/www.blackrock.com\/us\/individual\/insights\/metaverse-investing-in-the-future. Online; accessed 17 May 2022."},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2802083.2808391"},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","unstructured":"Amitav Sarma Bhupen Barman GautamC Das Hiranya Saikia and AmbathD Momin. 2020. Correlation between the arm-span and the standing height among males and females of the Khasi tribal population of Meghalaya state of North-Eastern India. 6125\u00a0pages. https:\/\/doi.org\/10.4103\/jfmpc.jfmpc_1350_20","DOI":"10.4103\/jfmpc.jfmpc_1350_20"},{"key":"e_1_3_2_2_74_1","volume-title":"https:\/\/www.raceroom.com\/en\/. Online","author":"Studios W\u00a0Studios","year":"2022","unstructured":"KW\u00a0Studios Sector3\u00a0Studios. 2022. RaceRoom. https:\/\/www.raceroom.com\/en\/. Online; accessed 17 May 2022."},{"key":"e_1_3_2_2_75_1","volume-title":"Samsung Gear VR 2017 detailed specifications. https:\/\/www.sizescreens.com\/samsung-gear-vr-2017-specifications\/. Online; accessed","year":"2017","unstructured":"Sizescreens. 2017. Samsung Gear VR 2017 detailed specifications. https:\/\/www.sizescreens.com\/samsung-gear-vr-2017-specifications\/. Online; accessed 17 July 2022."},{"key":"e_1_3_2_2_76_1","volume-title":"Metaverse: more evolutionary than revolutionary. https:\/\/www.morganstanley.com\/ideas\/metaverse-investing. Online","author":"Stanley Morgan","year":"2022","unstructured":"Morgan Stanley. 2022. Metaverse: more evolutionary than revolutionary. https:\/\/www.morganstanley.com\/ideas\/metaverse-investing. Online; accessed 17 May 2022."},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314111.3319915"},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"crossref","unstructured":"Sophie Stephenson Bijeeta Pal Stephen Fan Earlence Fernandes Yuhang Zhao and Rahul Chatterjee. 2022. SoK: Authentication in Augmented and Virtual Reality. 18\u00a0pages.","DOI":"10.1109\/SP46214.2022.9833742"},{"key":"e_1_3_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502008"},{"key":"e_1_3_2_2_80_1","volume-title":"OVRseen: Auditing Network Traffic and Privacy Policies in Oculus VR. In 31st USENIX Security Symposium (USENIX Security 22)","author":"Trimananda Rahmadi","year":"2022","unstructured":"Rahmadi Trimananda, Hieu Le, Hao Cui, Janice\u00a0Tran Ho, Anastasia Shuba, and Athina Markopoulou. 2022. OVRseen: Auditing Network Traffic and Privacy Policies in Oculus VR. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 3789\u20133806. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/trimananda"},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","unstructured":"Nikolaos Tsalis Alexios Mylonas Antonia Nisioti Dimitris Gritzalis and Vasilios Katos. 2017. Exploring the protection of private browsing in desktop browsers. 181\u2013197\u00a0pages. https:\/\/doi.org\/10.1016\/j.cose.2017.03.006","DOI":"10.1016\/j.cose.2017.03.006"},{"key":"e_1_3_2_2_82_1","volume-title":"Unity documentation. https:\/\/docs.unity3d.com\/Manual\/VROverview.html. Online","year":"2022","unstructured":"Unity. 2022. Unity documentation. https:\/\/docs.unity3d.com\/Manual\/VROverview.html. Online; accessed 17 July 2022."},{"key":"e_1_3_2_2_83_1","doi-asserted-by":"publisher","unstructured":"Samaikya Valluripally Aniket Gulhane Reshmi Mitra Khaza\u00a0Anuarul Hoque and Prasad Calyam. 2020. Attack Trees for Security and Privacy in Social Virtual Reality Learning Environments. 9\u00a0pages. https:\/\/doi.org\/10.1109\/CCNC46108.2020.9045724","DOI":"10.1109\/CCNC46108.2020.9045724"},{"key":"e_1_3_2_2_84_1","unstructured":"Valve. 2022. OpenVR. https:\/\/github.com\/ValveSoftware\/openvr. Online."},{"key":"e_1_3_2_2_85_1","volume-title":"SteamVR Base Station 2.0. https:\/\/www.vive.com\/us\/accessory\/base-station2\/. Online","year":"2022","unstructured":"Vive. 2022. SteamVR Base Station 2.0. https:\/\/www.vive.com\/us\/accessory\/base-station2\/. Online; accessed 17 July 2022."},{"key":"e_1_3_2_2_86_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1965.10480775"},{"key":"e_1_3_2_2_87_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12107"},{"key":"e_1_3_2_2_88_1","doi-asserted-by":"publisher","unstructured":"David\u00a0L. Woods John\u00a0M. Wyma E.\u00a0William Yund Timothy\u00a0J. Herron and Bruce Reed. 2015. Age-related slowing of response selection and production in a visual choice reaction time task. https:\/\/doi.org\/10.3389\/fnhum.2015.00193","DOI":"10.3389\/fnhum.2015.00193"},{"key":"e_1_3_2_2_89_1","doi-asserted-by":"publisher","unstructured":"Chuan Yue. 2016. Sensor-Based Mobile Web Fingerprinting and Cross-Site Input Inference Attacks. 241-244\u00a0pages. https:\/\/doi.org\/10.1109\/SPW.2016.17","DOI":"10.1109\/SPW.2016.17"},{"key":"e_1_3_2_2_90_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Zaheri Mojtaba","year":"2022","unstructured":"Mojtaba Zaheri, Yossi Oren, and Reza Curtmola. 2022. Targeted Deanonymization via the Cache Side Channel: Attacks and Defenses. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 20\u00a0pages. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/zaheri"},{"key":"e_1_3_2_2_91_1","unstructured":"Jun Zhao Teng Wang Tao Bai Kwok-Yan Lam Zhiying Xu Shuyu Shi Xuebin Ren Xinyu Yang Yang Liu and Han Yu. 2019. Reviewing and Improving the Gaussian Mechanism for Differential Privacy. arxiv:1911.12060\u00a0[cs.CR]"},{"key":"e_1_3_2_2_92_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigCom53800.2021.00011"}],"event":{"name":"UIST '23: The 36th Annual ACM Symposium on User Interface Software and Technology","location":"San Francisco CA USA","acronym":"UIST '23","sponsor":["SIGGRAPH ACM Special Interest Group on Computer Graphics and Interactive Techniques","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 36th Annual ACM Symposium on User Interface Software and Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3586183.3606754","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3586183.3606754","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T23:52:00Z","timestamp":1755820320000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3586183.3606754"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,29]]},"references-count":92,"alternative-id":["10.1145\/3586183.3606754","10.1145\/3586183"],"URL":"https:\/\/doi.org\/10.1145\/3586183.3606754","relation":{},"subject":[],"published":{"date-parts":[[2023,10,29]]},"assertion":[{"value":"2023-10-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}