{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T07:59:02Z","timestamp":1776931142275,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":121,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,12]]},"DOI":"10.1145\/3756884.3766045","type":"proceedings-article","created":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T07:47:22Z","timestamp":1764920842000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Beyond the Headset: A Systematization of Knowledge on Extended Reality Privacy and Security in Healthcare"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-8655-130X","authenticated-orcid":false,"given":"Nafisa","family":"Anjum","sequence":"first","affiliation":[{"name":"Dept. of Computer Science, Kennesaw State University, Marietta, Georgia, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2094-8192","authenticated-orcid":false,"given":"M Rasel","family":"Mahmud","sequence":"additional","affiliation":[{"name":"Assistant Professor Computer Science, Kennesaw State University, MARIETTA, Georgia, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,12,4]]},"reference":[{"key":"e_1_3_3_2_2_2","unstructured":"[n. d.]. Regulation (EU) 2016\/679 of the European Parliament and of the Council. Official Journal of the European Union L\u00a0119 1\u201388. https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3531073.3531106"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/3546155.3546691"},{"key":"e_1_3_3_2_5_2","first-page":"427","volume-title":"Fourteenth symposium on usable privacy and security (SOUPS 2018)","author":"Adams Devon","year":"2018","unstructured":"Devon Adams, Alseny Bah, Catherine Barwulor, Nureli Musaby, Kadeem Pitkin, and Elissa\u00a0M Redmiles. 2018. Ethics emerging: the story of privacy and security perceptions in virtual reality. In Fourteenth symposium on usable privacy and security (SOUPS 2018). 427\u2013442."},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/VR50410.2021.00081"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"crossref","unstructured":"A\u2019aeshah Alhakamy. 2024. Extended reality (XR) toward building immersive solutions: the key to unlocking industry 4.0. Comput. Surveys 56 9 (2024) 1\u201338.","DOI":"10.1145\/3652595"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISI49825.2020.9280516"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"crossref","unstructured":"Christopher Andrews Michael\u00a0K Southworth Jennifer\u00a0NA Silva and Jonathan\u00a0R Silva. 2019. Extended reality in medical practice. Current treatment options in cardiovascular medicine 21 (2019) 1\u201312.","DOI":"10.1007\/s11936-019-0722-7"},{"key":"e_1_3_3_2_10_2","volume-title":"Apple Vision Pro","author":"Inc. Apple","year":"2025","unstructured":"Apple Inc.2025. Apple Vision Pro. https:\/\/www.apple.com\/apple-vision-pro\/ Accessed: 2025-07-03."},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.28"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"crossref","unstructured":"Salil\u00a0P Banerjee and Damon\u00a0L Woodard. 2012. Biometric authentication and identification using keystroke dynamics: A survey. Journal of Pattern recognition research 7 1 (2012) 116\u2013139.","DOI":"10.13176\/11.427"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1093\/hebz\/9780198869443.001.0001"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"crossref","unstructured":"Efe Bozkir Onur G\u00fcnl\u00fc Wolfgang Fuhl Rafael\u00a0F Schaefer and Enkelejda Kasneci. 2021. Differential privacy for eye tracking with temporal correlations. Plos one 16 8 (2021) e0255979.","DOI":"10.1371\/journal.pone.0255979"},{"key":"e_1_3_3_2_15_2","volume-title":"The engineering design of systems: models and methods","author":"Buede Dennis\u00a0M","year":"2024","unstructured":"Dennis\u00a0M Buede and William\u00a0D Miller. 2024. The engineering design of systems: models and methods. John Wiley & Sons."},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"crossref","unstructured":"Peter Casey Ibrahim Baggili and Ananya Yarramreddy. 2019. Immersive virtual reality attacks and the human joystick. IEEE Transactions on Dependable and Secure Computing 18 2 (2019) 550\u2013562.","DOI":"10.1109\/TDSC.2019.2907942"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00010"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"crossref","unstructured":"Yuhan Chen Zhuoren Zhou Min Cao Min Liu Zhihao Lin Weixin Yang Xiao Yang Denzel Dhaidhai and Peng Xiong. 2022. Extended Reality (XR) and telehealth interventions for children or adolescents with autism spectrum disorder: Systematic review of qualitative and quantitative studies. Neuroscience & Biobehavioral Reviews 138 (2022) 104683.","DOI":"10.1016\/j.neubiorev.2022.104683"},{"key":"e_1_3_3_2_19_2","first-page":"S30\u2013S30","volume-title":"JOURNAL OF SPORT & EXERCISE PSYCHOLOGY","author":"Cordova Albeto","year":"2023","unstructured":"Albeto Cordova, Michael Stewart, John Quarles, Rasel Mahmud, Wan Yao, Se-Woong Park, William Land, and David Ogu. 2023. Real-time auditory feedback improves aging balance in immersive virtual environments. In JOURNAL OF SPORT & EXERCISE PSYCHOLOGY, Vol.\u00a045. HUMAN KINETICS PUBL INC 1607 N MARKET ST, PO BOX 5076, CHAMPAIGN, IL 61820\u00a0\u2026, S30\u2013S30."},{"key":"e_1_3_3_2_20_2","volume-title":"Qualitative inquiry and research design: Choosing among five approaches","author":"Creswell John\u00a0W","year":"2016","unstructured":"John\u00a0W Creswell and Cheryl\u00a0N Poth. 2016. Qualitative inquiry and research design: Choosing among five approaches. Sage publications."},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"crossref","unstructured":"Brendan David-John Diane Hosfelt Kevin Butler and Eakta Jain. 2021. A privacy-preserving approach to streaming eye-tracking data. IEEE Transactions on Visualization and Computer Graphics 27 5 (2021) 2555\u20132565.","DOI":"10.1109\/TVCG.2021.3067787"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"crossref","unstructured":"Jaybie\u00a0A De\u00a0Guzman Kanchana Thilakarathna and Aruna Seneviratne. 2019. Security and privacy approaches in mixed reality: A literature survey. ACM Computing Surveys (CSUR) 52 6 (2019) 1\u201337.","DOI":"10.1145\/3359626"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/3546155.3546663"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"crossref","unstructured":"Xavier Ferrer Tom Van\u00a0Nuenen Jose\u00a0M Such Mark Cot\u00e9 and Natalia Criado. 2021. Bias and discrimination in AI: a cross-disciplinary perspective. IEEE Technology and Society Magazine 40 2 (2021) 72\u201380.","DOI":"10.1109\/MTS.2021.3056293"},{"key":"e_1_3_3_2_25_2","volume-title":"Conducting research literature reviews: From the internet to paper","author":"Fink Arlene","year":"2019","unstructured":"Arlene Fink. 2019. Conducting research literature reviews: From the internet to paper. Sage publications."},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"crossref","unstructured":"Joint\u00a0Task Force and Transformation Initiative. 2013. Security and privacy controls for federal information systems and organizations. NIST Special Publication 800 53 (2013) 8\u201313.","DOI":"10.6028\/NIST.SP.800-53r4"},{"key":"e_1_3_3_2_27_2","volume-title":"Common Vulnerability Scoring System Version 3.1: Specification Document","author":"(FIRST) Forum of Incident Response and Security Teams","year":"2019","unstructured":"Forum of Incident Response and Security Teams (FIRST). 2019. Common Vulnerability Scoring System Version 3.1: Specification Document. Technical Report. FIRST. https:\/\/www.first.org\/cvss\/v3-1\/specification-document"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"crossref","unstructured":"Zhangjie Fu Jiashuang Xu Zhuangdi Zhu Alex\u00a0X Liu and Xingming Sun. 2018. Writing in the air with WiFi signals for virtual reality devices. IEEE Transactions on Mobile Computing 18 2 (2018) 473\u2013484.","DOI":"10.1109\/TMC.2018.2831709"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3312959"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"crossref","unstructured":"Alexander\u00a0A Ganin Phuoc Quach Mahesh Panwar Zachary\u00a0A Collier Jeffrey\u00a0M Keisler Dayton Marchese and Igor Linkov. 2020. Multicriteria decision framework for cybersecurity risk assessment and management. Risk Analysis 40 1 (2020) 183\u2013199.","DOI":"10.1111\/risa.12891"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"crossref","unstructured":"Alberto Giaretta. 2024. Security and privacy in virtual reality: a literature survey. Virtual Reality 29 1 (2024) 10.","DOI":"10.1007\/s10055-024-01079-9"},{"key":"e_1_3_3_2_32_2","first-page":"859","volume-title":"32nd USENIX security symposium (USENIX Security 23)","author":"Gopal Sindhu Reddy\u00a0Kalathur","year":"2023","unstructured":"Sindhu Reddy\u00a0Kalathur Gopal, Diksha Shukla, James\u00a0David Wheelock, and Nitesh Saxena. 2023. Hidden reality: Caution, your hand gesture inputs in the immersive virtual world are visible to all!. In 32nd USENIX security symposium (USENIX Security 23). 859\u2013876."},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR-Adjunct64951.2024.00012"},{"key":"e_1_3_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2019.8651847"},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"crossref","unstructured":"Bo Han Parth Pathak Songqing Chen and Lap-Fai Yu. 2022. CoMIC: A collaborative mobile immersive computing infrastructure for conducting multi-user XR research. IEEE Network 37 6 (2022) 124\u2013131.","DOI":"10.1109\/MNET.126.2200385"},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"crossref","unstructured":"Yuliia Horbenko. 2025. Confidential Computing in Front-End: Enhancing Data Security with Secure Enclaves and Homomorphic Encryption. International Journal of Advanced Multidisciplinary Research and Studies 5 3 (2025) 308\u2013321.","DOI":"10.62225\/2583049X.2025.5.3.4230"},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR-Adjunct64951.2024.00124"},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"crossref","unstructured":"Yuhong Huang Lei Cao Hongbiao Zhang Luting Kong Jingwen Xu Chenguang Jin and Xintai Wang. 2025. Model between Network Quality and XR User\u2019s Experience in Terms of Video Stalling for Cloud Rendering XR. IEEE Access (2025).","DOI":"10.1109\/ACCESS.2025.3557518"},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"crossref","unstructured":"Xinhui Jiang Jussi\u00a0PP Jokinen Antti Oulasvirta and Xiangshi Ren. 2022. Learning to type with mobile keyboards: Findings with a randomized keyboard. Computers in Human Behavior 126 (2022) 106992.","DOI":"10.1016\/j.chb.2021.106992"},{"key":"e_1_3_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/3314111.3319816"},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-30r1"},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/SPW63631.2024.00031"},{"key":"e_1_3_3_2_43_2","first-page":"5467","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Koch Simon","year":"2023","unstructured":"Simon Koch, Benjamin Altpeter, and Martin Johns. 2023. The { OK} is not enough: A large scale study of consent dialogs in smartphone applications. In 32nd USENIX Security Symposium (USENIX Security 23). 5467\u20135484."},{"key":"e_1_3_3_2_44_2","doi-asserted-by":"crossref","unstructured":"Dilshani Kumarapeli Sungchul Jung and Robert\u00a0W Lindeman. 2024. Privacy threats of behaviour identity detection in VR. Frontiers in Virtual Reality 5 (2024) 1197547.","DOI":"10.3389\/frvir.2024.1197547"},{"key":"e_1_3_3_2_45_2","doi-asserted-by":"crossref","unstructured":"Kaitlyn Lake Andrea Mc\u00a0Kittrick Mathilde Desselle Antonio Padilha\u00a0Lanari Bo R\u00a0Achintha\u00a0M Abayasiri Jennifer Fleming Nilufar Baghaei Dan\u00a0Dongseong Kim et\u00a0al. 2024. Cybersecurity and Privacy Issues in Extended Reality Health Care Applications: Scoping Review. JMIR XR and Spatial Computing (JMXR) 1 1 (2024) e59409.","DOI":"10.2196\/59409"},{"key":"e_1_3_3_2_46_2","doi-asserted-by":"crossref","unstructured":"Richard Lamb Jason Perry Emily\u00a0C Sutherland Douglas Hoston\u00a0Jr Alex Garris and Aniya\u00a0M DeRiggs. 2025. Effectiveness of XR-Based Exposure Therapy for Phobic Disorders. Journal of Counseling & Development 103 3 (2025) 316\u2013333.","DOI":"10.1002\/jcad.12557"},{"key":"e_1_3_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/CNS48642.2020.9162330"},{"key":"e_1_3_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2017.8228630"},{"key":"e_1_3_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445528"},{"key":"e_1_3_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.1145\/3489849.3489880"},{"key":"e_1_3_3_2_51_2","unstructured":"Gyubeom Lim Heejun Youn Hyojin Kim Hyunghwa Jeong Jeongmok Cho Seunghyun Lee Changsik Pak and Soonchul Kwon. 2024. Impact of Mixed Reality-Based Rehabilitation on Muscle Activity in Lower-Limb Amputees: An EMG Analysis. IEEE Access (2024)."},{"key":"e_1_3_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2019.8802674"},{"key":"e_1_3_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1201\/b11471"},{"key":"e_1_3_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.1109\/VR51125.2022.00064"},{"key":"e_1_3_3_2_55_2","doi-asserted-by":"crossref","unstructured":"Don Maclean. 2017. The NIST risk management framework: Problems and recommendations. Cyber Security: A Peer-Reviewed Journal 1 3 (2017) 207\u2013217.","DOI":"10.69554\/RBGR6031"},{"key":"e_1_3_3_2_56_2","unstructured":"M\u00a0Rasel Mahmud. 2023. Multimodal Feedback Techniques to Increase Accessibility of Immersive Virtual Reality. Ph.\u00a0D. Dissertation."},{"key":"e_1_3_3_2_57_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR59233.2023.00072"},{"key":"e_1_3_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.1145\/3597638.3608406"},{"key":"e_1_3_3_2_59_2","doi-asserted-by":"crossref","unstructured":"M\u00a0Rasel Mahmud Alberto Cordova and John Quarles. 2023. Visual cues for a steadier you: visual feedback methods improved standing balance in virtual reality for people with balance impairments. IEEE transactions on visualization and computer graphics 29 11 (2023) 4666\u20134675.","DOI":"10.1109\/TVCG.2023.3320244"},{"key":"e_1_3_3_2_60_2","doi-asserted-by":"crossref","unstructured":"M\u00a0Rasel Mahmud Alberto Cordova and John Quarles. 2024. Multimodal feedback methods for advancing the accessibility of immersive virtual reality for people with balance impairments due to multiple sclerosis. IEEE Transactions on Visualization and Computer Graphics (2024).","DOI":"10.1109\/TVCG.2024.3456189"},{"key":"e_1_3_3_2_61_2","doi-asserted-by":"publisher","DOI":"10.1109\/VR51125.2022.00100"},{"key":"e_1_3_3_2_62_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR55827.2022.00103"},{"key":"e_1_3_3_2_63_2","doi-asserted-by":"publisher","DOI":"10.1145\/3562939.3565638"},{"key":"e_1_3_3_2_64_2","doi-asserted-by":"crossref","unstructured":"M\u00a0Rasel Mahmud Michael Stewart Alberto Cordova and John Quarles. 2022. Vibrotactile feedback to make real walking in virtual reality more accessible. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2208.02403 (2022).","DOI":"10.36227\/techrxiv.20425650.v1"},{"key":"e_1_3_3_2_65_2","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3382799"},{"key":"e_1_3_3_2_66_2","doi-asserted-by":"crossref","unstructured":"Tobias\u00a0A Mattei. 2017. Privacy confidentiality and security of health care information: Lessons from the recent Wannacry cyberattack. World neurosurgery 104 (2017) 972\u2013974.","DOI":"10.1016\/j.wneu.2017.06.104"},{"key":"e_1_3_3_2_67_2","doi-asserted-by":"crossref","unstructured":"Yan Meng Yuxia Zhan Jiachun Li Suguo Du Haojin Zhu and Xuemin Shen. 2024. De-Anonymizing Avatars in Virtual Reality: Attacks and Countermeasures. IEEE Transactions on Mobile Computing (2024).","DOI":"10.1109\/TMC.2024.3426046"},{"key":"e_1_3_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.1109\/VR51125.2022.00098"},{"key":"e_1_3_3_2_69_2","doi-asserted-by":"publisher","DOI":"10.1109\/VR51125.2022.00060"},{"key":"e_1_3_3_2_70_2","volume-title":"Matrix | MITRE ATT&ACK\u00ae","author":"ATT&CK MITRE","year":"2023","unstructured":"MITRE ATT&CK. 2023. Matrix | MITRE ATT&ACK\u00ae. https:\/\/attack.mitre.org\/matrices\/ics\/"},{"key":"e_1_3_3_2_71_2","doi-asserted-by":"publisher","DOI":"10.1109\/VRW52623.2021.00160"},{"key":"e_1_3_3_2_72_2","doi-asserted-by":"publisher","DOI":"10.1145\/3180445.3180450"},{"key":"e_1_3_3_2_73_2","first-page":"895","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Nair Vivek","year":"2023","unstructured":"Vivek Nair, Wenbo Guo, Justus Mattern, Rui Wang, James\u00a0F O\u2019Brien, Louis Rosenberg, and Dawn Song. 2023. Unique identification of 50,000+ virtual reality users from head & hand motion data. In 32nd USENIX Security Symposium (USENIX Security 23). 895\u2013910."},{"key":"e_1_3_3_2_74_2","unstructured":"Vivek Nair Christian Rack Wenbo Guo Rui Wang Shuixian Li Brandon Huang Atticus Cull James\u00a0F O\u2019Brien Marc Latoschik Louis Rosenberg et\u00a0al. 2023. Inferring private personal attributes of virtual reality users from head and hand motion data. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2305.19198 (2023)."},{"key":"e_1_3_3_2_75_2","doi-asserted-by":"crossref","unstructured":"Vivek Nair Louis Rosenberg James\u00a0F O\u2019Brien and Dawn Song. 2023. Truth in motion: The unprecedented risks and opportunities of extended reality motion data. IEEE Security & Privacy 22 1 (2023) 24\u201332.","DOI":"10.1109\/MSEC.2023.3330392"},{"key":"e_1_3_3_2_76_2","first-page":"2779","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Nguyen Anh","year":"2024","unstructured":"Anh Nguyen, Xiaokuan Zhang, and Zhisheng Yan. 2024. Penetration vision through virtual reality headsets: identifying 360-degree videos from head movements. In 33rd USENIX Security Symposium (USENIX Security 24). 2779\u20132796."},{"key":"e_1_3_3_2_77_2","doi-asserted-by":"crossref","unstructured":"H\u00e5vard\u00a0Jakobsen Ofte and Sokratis Katsikas. 2023. Understanding situation awareness in SOCs a systematic literature review. Computers & Security 126 (2023) 103069.","DOI":"10.1016\/j.cose.2022.103069"},{"key":"e_1_3_3_2_78_2","doi-asserted-by":"crossref","unstructured":"Chitu Okoli and Kira Schabram. 2015. A guide to conducting a systematic literature review of information systems research. (2015).","DOI":"10.17705\/1CAIS.03743"},{"key":"e_1_3_3_2_79_2","doi-asserted-by":"crossref","unstructured":"Ilesanmi Olade Charles Fleming and Hai-Ning Liang. 2020. Biomove: Biometric user identification from human kinesiological movements for virtual reality systems. Sensors 20 10 (2020) 2944.","DOI":"10.3390\/s20102944"},{"key":"e_1_3_3_2_80_2","volume-title":"Extended reality (xr) & gamification in the context of the internet of things (iot) and artificial intelligence (ai)","author":"Pappas Georgios","year":"2021","unstructured":"Georgios Pappas. 2021. Extended reality (xr) & gamification in the context of the internet of things (iot) and artificial intelligence (ai). Michigan State University."},{"key":"e_1_3_3_2_81_2","doi-asserted-by":"publisher","DOI":"10.1145\/3564533.3564565"},{"key":"e_1_3_3_2_82_2","unstructured":"Parth\u00a0Dipakkumar Patel and Prem Trivedi. 2022. A systematic literature review on virtual reality and augmented reality in terms of privacy authorization and data-leaks. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2212.04621 (2022)."},{"key":"e_1_3_3_2_83_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300340"},{"key":"e_1_3_3_2_84_2","first-page":"264","volume-title":"Proc. of the 13th European Conference on Cyber Warfare and Security","author":"Pipyros Kosmas","year":"2014","unstructured":"Kosmas Pipyros, Lilian Mitrou, Dimitris Gritzalis, and Theodore Apostolopoulos. 2014. A cyber attack evaluation methodology. In Proc. of the 13th European Conference on Cyber Warfare and Security. 264\u2013270."},{"key":"e_1_3_3_2_85_2","doi-asserted-by":"crossref","unstructured":"Muhammad\u00a0Usman Rafique and S\u00a0Cheung Sen-ching. 2020. Tracking attacks on virtual reality systems. IEEE Consumer Electronics Magazine 9 2 (2020) 41\u201346.","DOI":"10.1109\/MCE.2019.2953741"},{"key":"e_1_3_3_2_86_2","volume-title":"Audio Engineering Society Conference: 2022 AES International Conference on Audio for Virtual and Augmented Reality","author":"Rudzki Tomasz","year":"2022","unstructured":"Tomasz Rudzki, Damian Murphy, and Gavin Kearney. 2022. XR-based HRTF measurements. In Audio Engineering Society Conference: 2022 AES International Conference on Audio for Virtual and Augmented Reality. Audio Engineering Society."},{"key":"e_1_3_3_2_87_2","first-page":"141","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Ruth Kimberly","year":"2019","unstructured":"Kimberly Ruth, Tadayoshi Kohno, and Franziska Roesner. 2019. Secure { Multi-User} content sharing for augmented reality applications. In 28th USENIX Security Symposium (USENIX Security 19). 141\u2013158."},{"key":"e_1_3_3_2_88_2","doi-asserted-by":"crossref","unstructured":"Yoones\u00a0A Sekhavat. 2016. Privacy preserving cloth try-on using mobile augmented reality. IEEE Transactions on Multimedia 19 5 (2016) 1041\u20131049.","DOI":"10.1109\/TMM.2016.2639380"},{"key":"e_1_3_3_2_89_2","doi-asserted-by":"crossref","unstructured":"Jiacheng Shang Si Chen Jie Wu and Shu Yin. 2020. ARSpy: Breaking location-based multi-player augmented reality application for user location tracking. IEEE Transactions on Mobile Computing 21 2 (2020) 433\u2013447.","DOI":"10.1109\/TMC.2020.3007740"},{"key":"e_1_3_3_2_90_2","doi-asserted-by":"crossref","unstructured":"Xingdong Sheng Shijie Mao Yichao Yan and Xiaokang Yang. 2024. Review on SLAM algorithms for Augmented Reality. Displays (2024) 102806.","DOI":"10.1016\/j.displa.2024.102806"},{"key":"e_1_3_3_2_91_2","doi-asserted-by":"publisher","DOI":"10.1145\/3447993.3483272"},{"key":"e_1_3_3_2_92_2","unstructured":"Yuying Shi. 2024. Impact of Extended Reality Applications on Communication Protocol Design. (2024)."},{"key":"e_1_3_3_2_93_2","doi-asserted-by":"crossref","unstructured":"Diksha Shukla and Vir\u00a0V Phoha. 2019. Stealing passwords by observing hands movement. IEEE Transactions on Information Forensics and Security 14 12 (2019) 3086\u20133101.","DOI":"10.1109\/TIFS.2019.2911171"},{"key":"e_1_3_3_2_94_2","volume-title":"Norsk IKT-konferanse for forskning og utdanning","author":"Sivelle Camille","year":"2024","unstructured":"Camille Sivelle, David Palma, and Katrien De\u00a0Moor. 2024. Extended Reality in critical sectors: Exploring the use cases and challenges. In Norsk IKT-konferanse for forskning og utdanning."},{"key":"e_1_3_3_2_95_2","first-page":"159","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Slocum Carter","year":"2023","unstructured":"Carter Slocum, Yicheng Zhang, Nael Abu-Ghazaleh, and Jiasi Chen. 2023. Going through the motions:{ AR\/VR} keylogging from user head motions. In 32nd USENIX Security Symposium (USENIX Security 23). 159\u2013174."},{"key":"e_1_3_3_2_96_2","first-page":"2761","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Slocum Carter","year":"2024","unstructured":"Carter Slocum, Yicheng Zhang, Erfan Shayegani, Pedram Zaree, Nael Abu-Ghazaleh, and Jiasi Chen. 2024. That Doesn\u2019t Go There: Attacks on Shared State in { Multi-User} Augmented Reality Applications. In 33rd USENIX Security Symposium (USENIX Security 24). 2761\u20132778."},{"key":"e_1_3_3_2_97_2","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM60985.2024.00024"},{"key":"e_1_3_3_2_98_2","doi-asserted-by":"publisher","DOI":"10.1109\/EMBC44109.2020.9176698"},{"key":"e_1_3_3_2_99_2","doi-asserted-by":"publisher","DOI":"10.1145\/3314111.3319915"},{"key":"e_1_3_3_2_100_2","unstructured":"RUOXI SUN HANWEN WANG MINHUI XUE and HSIANG-TING CHEN. [n. d.]. Privacy in Motion: Implementing Differential Privacy for User Motion in VR. ([n. d.])."},{"key":"e_1_3_3_2_101_2","doi-asserted-by":"crossref","unstructured":"Pier\u00a0Paolo Tricomi Federica Nenna Luca Pajola Mauro Conti and Luciano Gamberini. 2023. You can\u2019t hide behind your headset: User profiling in augmented and virtual reality. IEEE Access 11 (2023) 9859\u20139875.","DOI":"10.1109\/ACCESS.2023.3240071"},{"key":"e_1_3_3_2_102_2","first-page":"3789","volume-title":"31st USENIX security symposium (USENIX security 22)","author":"Trimananda Rahmadi","year":"2022","unstructured":"Rahmadi Trimananda, Hieu Le, Hao Cui, Janice\u00a0Tran Ho, Anastasia Shuba, and Athina Markopoulou. 2022. { OVRseen} : Auditing network traffic and privacy policies in oculus { VR}. In 31st USENIX security symposium (USENIX security 22). 3789\u20133806."},{"key":"e_1_3_3_2_103_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517728"},{"key":"e_1_3_3_2_104_2","volume-title":"Health Insurance Portability and Accountability Act of 1996 (HIPAA)","author":"Services U.S. Department of Health and Human","year":"1996","unstructured":"U.S. Department of Health and Human Services. 1996. Health Insurance Portability and Accountability Act of 1996 (HIPAA). https:\/\/www.hhs.gov\/hipaa\/index.html Public Law 104\u2013191."},{"key":"e_1_3_3_2_105_2","volume-title":"Cybersecurity in Medical Devices: Quality System Considerations and Content of Premarket Submissions","author":"Administration U.S. Department of Health and Human Services, Food and Drug","year":"2023","unstructured":"U.S. Department of Health and Human Services, Food and Drug Administration. 2023. Cybersecurity in Medical Devices: Quality System Considerations and Content of Premarket Submissions. Guidance for Industry and Food and Drug Administration Staff. U.S. Food and Drug Administration. https:\/\/www.fda.gov\/media\/119933\/download"},{"key":"e_1_3_3_2_106_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR-Adjunct64951.2024.00013"},{"key":"e_1_3_3_2_107_2","doi-asserted-by":"crossref","unstructured":"Samaikya Valluripally Aniket Gulhane Khaza\u00a0Anuarul Hoque and Prasad Calyam. 2021. Modeling and defense of social virtual reality attacks inducing cybersickness. IEEE Transactions on Dependable and Secure Computing 19 6 (2021) 4127\u20134144.","DOI":"10.1109\/TDSC.2021.3121216"},{"key":"e_1_3_3_2_108_2","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC46108.2020.9045724"},{"key":"e_1_3_3_2_109_2","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690285"},{"key":"e_1_3_3_2_110_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3451769"},{"key":"e_1_3_3_2_111_2","doi-asserted-by":"publisher","DOI":"10.1109\/PerComWorkshops59983.2024.10503341"},{"key":"e_1_3_3_2_112_2","unstructured":"Wikipedia contributors. 2025. DREAD (risk assessment model). https:\/\/en.wikipedia.org\/wiki\/DREAD_(risk_assessment_model)Accessed: 2025-03-10."},{"key":"e_1_3_3_2_113_2","volume-title":"HTC Vive","author":"contributors Wikipedia","year":"2025","unstructured":"Wikipedia contributors. 2025. HTC Vive. https:\/\/en.wikipedia.org\/wiki\/HTC_Vive"},{"key":"e_1_3_3_2_114_2","doi-asserted-by":"crossref","unstructured":"Hemendra Worlikar Sean Coleman Jack Kelly Sadhbh O\u2019Connor Aoife Murray Terri McVeigh Jennifer Doran Ian McCabe and Derek O\u2019Keeffe. 2023. Mixed reality platforms in telehealth delivery: scoping review. JMIR biomedical engineering 8 (2023) e42709.","DOI":"10.2196\/42709"},{"key":"e_1_3_3_2_115_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179301"},{"key":"e_1_3_3_2_116_2","unstructured":"Depeng Xu Weichao Wang and Aidong Lu. 2024. A Review of Motion Data Privacy in Virtual Reality. IEEE International Conference on Meta Computing."},{"key":"e_1_3_3_2_117_2","unstructured":"Jeong\u00a0Ok Yang and Jook\u00a0Sook Lee. 2021. Utilization exercise rehabilitation using metaverse (VR\u00b7 AR\u00b7 MR\u00b7 XR). Korean Journal of Applied Biomechanics 31 4 (2021) 249\u2013258."},{"key":"e_1_3_3_2_118_2","first-page":"2725","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Yang Zhuolin","year":"2024","unstructured":"Zhuolin Yang, Zain Sarwar, Iris Hwang, Ronik Bhaskar, Ben\u00a0Y Zhao, and Haitao Zheng. 2024. Can virtual reality protect users from keystroke inference attacks?. In 33rd USENIX Security Symposium (USENIX Security 24). 2725\u20132742."},{"key":"e_1_3_3_2_119_2","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00034"},{"key":"e_1_3_3_2_120_2","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623102"},{"key":"e_1_3_3_2_121_2","first-page":"3979","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Zhang Yicheng","year":"2023","unstructured":"Yicheng Zhang, Carter Slocum, Jiasi Chen, and Nael Abu-Ghazaleh. 2023. It\u2019s all in your head (set): Side-channel attacks on { AR\/VR} systems. In 32nd USENIX Security Symposium (USENIX Security 23). 3979\u20133996."},{"key":"e_1_3_3_2_122_2","doi-asserted-by":"crossref","unstructured":"David\u00a0J Zielinski Hrishikesh\u00a0M Rao Mark\u00a0A Sommer and Regis Kopper. 2015. Exploring the effects of image persistence in low frame rate virtual environments. In 2015 IEEE Virtual Reality (VR). IEEE 4 (2015) 19\u201326.","DOI":"10.1109\/VR.2015.7223319"}],"event":{"name":"VRST '25: 31st ACM Symposium on Virtual Reality Software and Technology","location":"Montreal QC Canada","acronym":"VRST '25","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGGRAPH ACM Special Interest Group on Computer Graphics and Interactive Techniques"]},"container-title":["Proceedings of the 2025 31st ACM Symposium on Virtual Reality Software and Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3756884.3766045","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T09:08:39Z","timestamp":1764925719000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3756884.3766045"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,12]]},"references-count":121,"alternative-id":["10.1145\/3756884.3766045","10.1145\/3756884"],"URL":"https:\/\/doi.org\/10.1145\/3756884.3766045","relation":{},"subject":[],"published":{"date-parts":[[2025,11,12]]},"assertion":[{"value":"2025-12-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}