{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:40:45Z","timestamp":1770226845567,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2028897 and 1916175"],"award-info":[{"award-number":["2028897 and 1916175"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Intel Gift Donation"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3690285","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"1731-1745","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["GAZEploit: Remote Keystroke Inference Attack by Gaze Estimation from Avatar Views in VR\/MR Devices"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5947-9285","authenticated-orcid":false,"given":"Hanqiu","family":"Wang","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1467-9056","authenticated-orcid":false,"given":"Zihao","family":"Zhan","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Texas Tech University, Lubbock, TX, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1440-1828","authenticated-orcid":false,"given":"Haoqi","family":"Shan","sequence":"additional","affiliation":[{"name":"Certik, New York, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-8021-1269","authenticated-orcid":false,"given":"Siqi","family":"Dai","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2849-7197","authenticated-orcid":false,"given":"Maximilian","family":"Panoff","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1827-4355","authenticated-orcid":false,"given":"Shuo","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Apple. 2024. Apple announces new accessibility features including Eye Tracking. https:\/\/www.apple.com\/newsroom\/2024\/05\/apple-announces-new-accessibility-features-including-eye-tracking\/"},{"key":"e_1_3_2_1_2_1","unstructured":"Apple. 2024. Apple Vision Pro Privacy Overview Learn How Apple Vision Pro and visionOS Protect Your Data. https:\/\/www.apple.com\/privacy\/docs\/Apple_Vision_Pro_Privacy_Overview.pdf"},{"key":"e_1_3_2_1_3_1","unstructured":"Apple. 2024. visionOS Overview. https:\/\/developer.apple.com\/visionos"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","unstructured":"Abdullah Al Arafat Zhishan Guo and Amro Awad. 2021. VR-Spy: A Side-Channel Attack on Virtual Key-Logging in VR Headsets. In 2021 IEEE Virtual Reality and 3D User Interfaces (VR). 564--572. https:\/\/doi.org\/10.1109\/VR50410.2021.00081","DOI":"10.1109\/VR50410.2021.00081"},{"key":"e_1_3_2_1_5_1","volume-title":"Computer Graphics Forum","author":"Blascheck Tanja","unstructured":"Tanja Blascheck, Kuno Kurzhals, Michael Raschke, Michael Burch, Daniel Weiskopf, and Thomas Ertl. 2017. Visualization of eye tracking data: A taxonomy and survey. In Computer Graphics Forum, Vol. 36. Wiley Online Library, 260--284."},{"key":"e_1_3_2_1_6_1","unstructured":"Nacho Caballero. 2024. Word-By-Frequency. https:\/\/github.com\/nachocab\/words-by-frequency"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom56396.2022.00059"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00010"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2024.3393571"},{"key":"e_1_3_2_1_10_1","unstructured":"HTC Corporation. 2024. About the VIVE controllers. https:\/\/www.vive.com\/au\/support\/cosmos-external-tracking-faceplate\/category_howto\/about-the-controllers.html"},{"key":"e_1_3_2_1_11_1","unstructured":"Roblox Corporation. 2018. Roblox. https:\/\/www.roblox.com\/"},{"key":"e_1_3_2_1_12_1","volume-title":"PrivatEyes: Appearance-based Gaze Estimation Using Federated Secure Multi-Party Computation. arXiv preprint arXiv:2402.18970","author":"Elfares Mayar","year":"2024","unstructured":"Mayar Elfares, Pascal Reisert, Zhiming Hu, Wenwu Tang, Ralf K\u00fcsters, and Andreas Bulling. 2024. PrivatEyes: Appearance-based Gaze Estimation Using Federated Secure Multi-Party Computation. arXiv preprint arXiv:2402.18970 (2024)."},{"key":"e_1_3_2_1_13_1","unstructured":"Fabio. 2022. Eye Tracking Keyboard. https:\/\/github.com\/fabio914\/EyeTrackingKeyboard"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01249-6_21"},{"key":"e_1_3_2_1_15_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Kalathur Gopal Sindhu Reddy","year":"2023","unstructured":"Sindhu Reddy Kalathur Gopal, Diksha Shukla, James David Wheelock, and Nitesh Saxena. 2023. Hidden Reality: Caution, Your Hand Gesture Inputs in the Immersive Virtual World are Visible to All!. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, Anaheim, CA, 859--876. https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/gopal"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3283289.3283335"},{"key":"e_1_3_2_1_17_1","unstructured":"hysts. 2021. A demo program of gaze estimation models (MPIIGaze MPIIFaceGaze ETH-XGaze). https:\/\/github.com\/hysts\/pytorch_mpiigaze_demo"},{"key":"e_1_3_2_1_18_1","unstructured":"Apple Inc. 2024. About Optic ID advanced technology. https:\/\/support.apple.com\/en-us\/118483"},{"key":"e_1_3_2_1_19_1","unstructured":"Apple Inc. 2024. Apple Vision Pro. https:\/\/www.apple.com\/apple-vision-pro\/#: :text=Data%20from%20cameras%20and%20sensors you%20tap%20your%20fingers%20together."},{"key":"e_1_3_2_1_20_1","unstructured":"Apple Inc. 2024. Type with the virtual keyboard on Apple Vision Pro. https:\/\/support.apple.com\/zh-cn\/guide\/apple-vision-pro\/tana14220eef\/visionos"},{"key":"e_1_3_2_1_21_1","unstructured":"Meta Platforms Inc. 2024 d. Eye tracking on Meta Quest Pro. https:\/\/www.meta.com\/help\/quest\/articles\/getting-started\/getting-started-with-quest-pro\/eye-tracking"},{"key":"e_1_3_2_1_22_1","unstructured":"VRChat Inc. [n. d.]. VRChat. https:\/\/hello.vrchat.com\/"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2021.106992"},{"key":"e_1_3_2_1_24_1","volume-title":"Virtual Reality Statistics: The Ultimate List","author":"Katatikarn Jasmine","year":"2024","unstructured":"Jasmine Katatikarn. 2022. Virtual Reality Statistics: The Ultimate List in 2024. https:\/\/academyofanimatedart.com\/virtual-reality-statistics\/"},{"key":"e_1_3_2_1_25_1","unstructured":"Dom Lachowicz. 2024. Enchant. https:\/\/abiword.github.io\/enchant\/"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103461"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2019.8802674"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/VR51125.2022.00064"},{"key":"e_1_3_2_1_29_1","volume-title":"Eavesdropping on Controller Acoustic Emanation for Keystroke Inference Attack in Virtual Reality. In The Network and Distributed System Security Symposium (NDSS).","author":"Luo Shiqing","year":"2024","unstructured":"Shiqing Luo, Anh Nguyen, Hafsa Farooq, Kun Sun, and Zhisheng Yan. 2024. Eavesdropping on Controller Acoustic Emanation for Keystroke Inference Attack in Virtual Reality. In The Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpsycho.2017.11.009"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917636"},{"key":"e_1_3_2_1_32_1","volume-title":"Metaverse Avatars: Reinvent Yourself in VR. https:\/\/www.meta.com\/avatars\/","year":"2022","unstructured":"Meta. 2022. Metaverse Avatars: Reinvent Yourself in VR. https:\/\/www.meta.com\/avatars\/"},{"key":"e_1_3_2_1_33_1","unstructured":"Meta. 2024. Meta Quest Pro: Our Most Advanced New VR Headset. https:\/\/www.meta.com\/quest\/quest-pro\/"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/VR51125.2022.00098"},{"key":"e_1_3_2_1_35_1","unstructured":"Saraju P Mohanty. 2021. Intel Pentium Processor. (2021)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1162\/pres_a_00356"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC56721.2023.10293868"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3204493.3204541"},{"key":"e_1_3_2_1_39_1","volume-title":"Apple's Vision Pro headset will turn you into a digital avatar when FaceTiming. The Verge (Jun","author":"Roth Emma","year":"2023","unstructured":"Emma Roth. 2023. Apple's Vision Pro headset will turn you into a digital avatar when FaceTiming. The Verge (Jun 2023). https:\/\/www.theverge.com\/2023\/6\/5\/23750096\/apple-vision-pro-headset-persona-facetime"},{"key":"e_1_3_2_1_40_1","volume-title":"Zoom on the Keystrokes: Exploiting Video Calls for Keystroke Inference Attacks. In Network and Distributed Systems Security (NDSS) Symposium","author":"Sabra Mohd","year":"2021","unstructured":"Mohd Sabra, Anindya Maiti, and Murtuza Jadliwala. 2021. Zoom on the Keystrokes: Exploiting Video Calls for Keystroke Inference Attacks. In Network and Distributed Systems Security (NDSS) Symposium 2021."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/78.650093"},{"key":"e_1_3_2_1_42_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Slocum Carter","year":"2023","unstructured":"Carter Slocum, Yicheng Zhang, Nael Abu-Ghazaleh, and Jiasi Chen. 2023. Going through the motions: AR\/VR keylogging from user head motions. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, Anaheim, CA, 159--174. https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/slocum"},{"key":"e_1_3_2_1_43_1","unstructured":"Sony. [n. d.]. PlayStation\u00aeVR2 | The next generation of VR gaming on PS5. https:\/\/www.playstation.com\/en-us\/ps-vr2\/"},{"key":"e_1_3_2_1_44_1","volume-title":"Your eyes reveal your secrets: An eye movement based password inference on smartphone","author":"Wang Yao","year":"2019","unstructured":"Yao Wang, Wandong Cai, Tao Gu, and Wei Shao. 2019. Your eyes reveal your secrets: An eye movement based password inference on smartphone. IEEE transactions on mobile computing, Vol. 19, 11 (2019), 2714--2730."},{"key":"e_1_3_2_1_45_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Yang Zhuolin","year":"2023","unstructured":"Zhuolin Yang, Yuxin Chen, Zain Sarwar, Hadleigh Schwartz, Ben Y. Zhao, and Haitao Zheng. 2023. Towards a General Video-based Keystroke Inference Attack. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, Anaheim, CA, 141--158. https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/yang-zhuolin"},{"key":"e_1_3_2_1_46_1","volume-title":"Proceedings, Part V 16","author":"Zhang Xucong","year":"2020","unstructured":"Xucong Zhang, Seonwook Park, Thabo Beeler, Derek Bradley, Siyu Tang, and Otmar Hilliges. 2020. Eth-xgaze: A large scale dataset for gaze estimation under extreme head pose and gaze variation. In Computer Vision--ECCV 2020: 16th European Conference, Glasgow, UK, August 23--28, 2020, Proceedings, Part V 16. Springer, 365--381."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7299081"},{"key":"e_1_3_2_1_48_1","volume-title":"Mpiigaze: Real-world dataset and deep appearance-based gaze estimation","author":"Zhang Xucong","year":"2017","unstructured":"Xucong Zhang, Yusuke Sugano, Mario Fritz, and Andreas Bulling. 2017. Mpiigaze: Real-world dataset and deep appearance-based gaze estimation. IEEE transactions on pattern analysis and machine intelligence, Vol. 41, 1 (2017), 162--175."},{"key":"e_1_3_2_1_49_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Zhang Yicheng","year":"2023","unstructured":"Yicheng Zhang, Carter Slocum, Jiasi Chen, and Nael Abu-Ghazaleh. 2023. Ittextquoterights all in your head(set): Side-channel attacks on AR\/VR systems. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, Anaheim, CA, 3979--3996. https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/zhang-yicheng"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3581641.3584072"}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","location":"Salt Lake City UT USA","acronym":"CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690285","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3690285","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:18:10Z","timestamp":1755843490000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690285"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":50,"alternative-id":["10.1145\/3658644.3690285","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3690285","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}