{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T07:13:08Z","timestamp":1773817988866,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":70,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,12]]},"DOI":"10.1145\/3756884.3766052","type":"proceedings-article","created":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T07:47:22Z","timestamp":1764920842000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Motion Forecasting Attacks on Behavioral Biometric Authentication Systems in Virtual Reality"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4867-2071","authenticated-orcid":false,"given":"Mingjun","family":"Li","sequence":"first","affiliation":[{"name":"University of Hartford, West Hartford, Connecticut, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0582-014X","authenticated-orcid":false,"given":"Ashutosh","family":"Shivakumar","sequence":"additional","affiliation":[{"name":"Wright State University, Dayton, Ohio, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7730-7754","authenticated-orcid":false,"given":"Natasha Kholgade","family":"Banerjee","sequence":"additional","affiliation":[{"name":"Wright State University, Dayton, Ohio, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3085-056X","authenticated-orcid":false,"given":"Sean","family":"Banerjee","sequence":"additional","affiliation":[{"name":"Wright State University, Dayton, Ohio, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,12,4]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"crossref","unstructured":"Andy Adler and Stephanie\u00a0AC Schuckers. 2015. Biometric Vulnerabilities Overview.","DOI":"10.1007\/978-1-4899-7488-4_65"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"crossref","unstructured":"Kunjal Ahir Kajal Govani Rutvik Gajera and Manan Shah. 2020. Application on virtual reality for enhanced education learning military training and sports. Augmented Human Research 5 (2020) 1\u20139.","DOI":"10.1007\/s41133-019-0025-2"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/VECIMS.2006.250805"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"crossref","unstructured":"Fawaz\u00a0A Alsulaiman and Abdulmotaleb El\u00a0Saddik. 2008. Three-dimensional password for more secure authentication. IEEE Transactions on Instrumentation and measurement 57 9 (2008) 1929\u20131938.","DOI":"10.1109\/TIM.2008.919905"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"crossref","unstructured":"Florian Alt and Stefan Schneegass. 2022. Beyond Passwords\u2014Challenges and Opportunities of Future Authentication. IEEE Security & Privacy 20 1 (2022) 82\u201386.","DOI":"10.1109\/MSEC.2021.3127459"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/VR59515.2025.00046"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01661"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/VR50410.2021.00085"},{"key":"e_1_3_3_1_10_2","first-page":"463","volume-title":"Future of Information and Communication Conference","author":"Campbell Abraham\u00a0G","year":"2019","unstructured":"Abraham\u00a0G Campbell, Thomas Holz, Jonny Cosgrove, Mike Harlick, and Tadhg O\u2019Sullivan. 2019. Uses of Virtual Reality for Communication in Financial Services: A Case Study on Comparing Different Telepresence Interfaces: Virtual Reality Compared to Video Conferencing. In Future of Information and Communication Conference. Springer, Berlin, Germany, 463\u2013481."},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20065-6_3"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/AIxVR59861.2024.00010"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"crossref","unstructured":"Claudia De\u00a0Armas Romero Tori and Antonio\u00a0Valerio Netto. 2020. Use of virtual reality simulators for training programs in the areas of security and defense: a systematic review. Multimedia Tools and Applications 79 5 (2020) 3495\u20133515.","DOI":"10.1007\/s11042-019-08141-8"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"crossref","unstructured":"Mathilde\u00a0R Desselle Ross\u00a0A Brown Allan\u00a0R James Mark\u00a0J Midwinter Sean\u00a0K Powell and Maria\u00a0A Woodruff. 2020. Augmented and virtual reality in surgery. Computing in Science & Engineering 22 3 (2020) 18\u201326.","DOI":"10.1109\/MCSE.2020.2972822"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2018.8585714"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3312959"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"crossref","unstructured":"Davrondzhon Gafurov Einar Snekkenes and Patrick Bours. 2007. Spoof attacks on gait authentication system. IEEE Transactions on Information Forensics and Security 2 3 (2007) 491\u2013502.","DOI":"10.1109\/TIFS.2007.902030"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445596"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3383923.3383950"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58465-8_5"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/VR.2019.8797862"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2017.23028"},{"key":"e_1_3_3_1_23_2","unstructured":"Alberto Giaretta. 2022. Security and Privacy in Virtual Reality\u2013A Literature Survey. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2205.00208 1 (2022) 1\u20131."},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"crossref","unstructured":"Jonathan Gurary Ye Zhu and Huirong Fu. 2017. Leveraging 3d benefits for authentication. International Journal of Communications Network and System Sciences 10 08 (2017) 324.","DOI":"10.4236\/ijcns.2017.108B035"},{"key":"e_1_3_3_1_25_2","first-page":"3280","volume-title":"Proceedings of the 21st international conference on pattern recognition (ICPR2012)","author":"Hadid Abdenour","year":"2012","unstructured":"Abdenour Hadid, Mohammad Ghahramani, Vili Kellokumpu, Matti Pietik\u00e4inen, John Bustard, and Mark Nixon. 2012. Can gait biometrics be spoofed?. In Proceedings of the 21st international conference on pattern recognition (ICPR2012). IEEE, Piscataway, NJ, 3280\u20133283."},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"crossref","unstructured":"Lisa Hasenbein Philipp Stark Ulrich Trautwein Anna Carolina\u00a0Muller Queiroz Jeremy Bailenson Jens-Uwe Hahn and Richard G\u00f6llner. 2022. Learning with simulated virtual classmates: Effects of social-related configurations on students\u2019 visual attention and learning experiences in an immersive virtual reality classroom. Computers in Human Behavior 133 (2022) 107282.","DOI":"10.1016\/j.chb.2022.107282"},{"key":"e_1_3_3_1_27_2","unstructured":"Matthias Hein and Maksym Andriushchenko. 2017. Formal guarantees on the robustness of a classifier against adversarial manipulation. Advances in neural information processing systems 30 (2017) 1\u201311."},{"key":"e_1_3_3_1_28_2","unstructured":"AK Jain. 2007. Handbook of biometrics. Springer google schola 2 (2007) 114\u2013116."},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3519736"},{"key":"e_1_3_3_1_30_2","unstructured":"Diederik\u00a0P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1412.6980 1 (2014) 1\u20131."},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712690"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/AIxVR59861.2024.00012"},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"crossref","unstructured":"Mingjun Li Natasha\u00a0Kholgade Banerjee and Sean Banerjee. 2025. Multimodal cross-system virtual reality (VR) ball throwing dataset for VR biometrics. Data in Brief 1 1 (2025) 111827.","DOI":"10.1016\/j.dib.2025.111827"},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445528"},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/3611659.3615696"},{"key":"e_1_3_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/3489849.3489880"},{"key":"e_1_3_3_1_37_2","doi-asserted-by":"crossref","unstructured":"Jonathan Liebers Patrick Laskowski Florian Rademaker Leon Sabel Jordan Hoppen Uwe Gruenefeld and Stefan Schneegass. 2024. Kinetic Signatures: A Systematic Investigation of Movement-Based User Identification in Virtual Reality. ACM 1 1 (2024) 1\u201319.","DOI":"10.1145\/3613904.3642471"},{"key":"e_1_3_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3382799"},{"key":"e_1_3_3_1_39_2","doi-asserted-by":"crossref","unstructured":"Samira Mehrabi John\u00a0E Mu\u00f1oz Aysha Basharat Jennifer Boger Shi Cao Michael Barnett-Cowan Laura\u00a0E Middleton et\u00a0al. 2022. Immersive virtual reality exergames to promote the well-being of community-dwelling older adults: Protocol for a mixed methods pilot study. JMIR Research Protocols 11 6 (2022) e32955.","DOI":"10.2196\/32955"},{"key":"e_1_3_3_1_40_2","doi-asserted-by":"crossref","unstructured":"Yan Meng Yuxia Zhan Jiachun Li Suguo Du Haojin Zhu and Xuemin Shen. 2024. De-Anonymizing Avatars in Virtual Reality: Attacks and Countermeasures. IEEE Transactions on Mobile Computing 1 1 (2024) 13342\u201313357.","DOI":"10.1109\/TMC.2024.3426046"},{"key":"e_1_3_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/VR50410.2021.00035"},{"key":"e_1_3_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/VR51125.2022.00060"},{"key":"e_1_3_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/VRW55335.2022.00193"},{"key":"e_1_3_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/AIxVR59861.2024.00052"},{"key":"e_1_3_3_1_45_2","first-page":"361","volume-title":"International conference on information security","author":"Mjaaland Bendik\u00a0B","year":"2010","unstructured":"Bendik\u00a0B Mjaaland, Patrick Bours, and Danilo Gligoroski. 2010. Walk the walk: Attacking gait biometrics by imitation. In International conference on information security. Springer, Heidelberg, Germany, 361\u2013380."},{"key":"e_1_3_3_1_46_2","doi-asserted-by":"crossref","unstructured":"Muhammad Muaaz and Ren\u00e9 Mayrhofer. 2017. Smartphone-based gait recognition: From authentication to imitation. IEEE Transactions on Mobile Computing 16 11 (2017) 3209\u20133221.","DOI":"10.1109\/TMC.2017.2686855"},{"key":"e_1_3_3_1_47_2","doi-asserted-by":"crossref","unstructured":"John Mu\u00f1oz Samira Mehrabi Yirou Li Aysha Basharat Laura\u00a0E Middleton Shi Cao Michael Barnett-Cowan Jennifer Boger et\u00a0al. 2022. Immersive virtual reality exergames for persons living with dementia: user-centered design study as a multistakeholder team during the COVID-19 pandemic. JMIR Serious Games 10 1 (2022) e29987.","DOI":"10.2196\/29987"},{"key":"e_1_3_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1145\/3586183.3606754"},{"key":"e_1_3_3_1_49_2","first-page":"2779","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Nguyen Anh","year":"2024","unstructured":"Anh Nguyen, Xiaokuan Zhang, and Zhisheng Yan. 2024. Penetration vision through virtual reality headsets: identifying 360-degree videos from head movements. In 33rd USENIX Security Symposium (USENIX Security 24). USENIX, Berkeley, CA, 2779\u20132796."},{"key":"e_1_3_3_1_50_2","doi-asserted-by":"crossref","unstructured":"Rodrigo\u00a0Frassetto Nogueira Roberto de Alencar\u00a0Lotufo and Rubens\u00a0Campos Machado. 2016. Fingerprint liveness detection using convolutional neural networks. IEEE transactions on information forensics and security 11 6 (2016) 1206\u20131213.","DOI":"10.1109\/TIFS.2016.2520880"},{"key":"e_1_3_3_1_51_2","doi-asserted-by":"crossref","unstructured":"Blessing Odeleye George Loukas Ryan Heartfield Georgia Sakellari Emmanouil Panaousis and Fotios Spyridonis. 2023. Virtually secure: A taxonomic assessment of cybersecurity challenges in virtual reality environments. Computers & Security 124 (2023) 102951.","DOI":"10.1016\/j.cose.2022.102951"},{"key":"e_1_3_3_1_52_2","doi-asserted-by":"publisher","DOI":"10.1145\/3385378.3385385"},{"key":"e_1_3_3_1_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300340"},{"key":"e_1_3_3_1_54_2","doi-asserted-by":"crossref","unstructured":"Christian Rack Tamara Fernando Murat Yalcin Andreas Hotho and Marc\u00a0Erich Latoschik. 2023. Who is alyx? a new behavioral biometric dataset for user identification in xr. Frontiers in Virtual Reality 4 (2023) 1272234.","DOI":"10.3389\/frvir.2023.1272234"},{"key":"e_1_3_3_1_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/3641825.3687711"},{"key":"e_1_3_3_1_56_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR55827.2022.00087"},{"key":"e_1_3_3_1_57_2","doi-asserted-by":"publisher","DOI":"10.1109\/WICT.2011.6141226"},{"key":"e_1_3_3_1_58_2","doi-asserted-by":"crossref","unstructured":"Wei Song Hong Jia Min Wang Yuezhong Wu Wanli Xue Chun\u00a0Tung Chou Jiankun Hu and Wen Hu. 2022. Pistis: Replay attack and liveness detection for gait-based user authentication system on wearable devices using vibration. IEEE Internet of Things Journal 10 9 (2022) 8155\u20138171.","DOI":"10.1109\/JIOT.2022.3231381"},{"key":"e_1_3_3_1_59_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833742"},{"key":"e_1_3_3_1_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/3617072.3617122"},{"key":"e_1_3_3_1_61_2","doi-asserted-by":"crossref","unstructured":"Juan\u00a0E Tapia Sebastian Gonzalez and Christoph Busch. 2021. Iris liveness detection using a cascade of dedicated deep learning networks. IEEE Transactions on Information Forensics and Security 17 (2021) 42\u201352.","DOI":"10.1109\/TIFS.2021.3132582"},{"key":"e_1_3_3_1_62_2","unstructured":"Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan\u00a0N Gomez \u0141ukasz Kaiser and Illia Polosukhin. 2017. Attention is all you need. Advances in neural information processing systems 30 (2017) 1\u201311."},{"key":"e_1_3_3_1_63_2","doi-asserted-by":"crossref","unstructured":"Martin Vondr\u00e1\u010dek Ibrahim Baggili Peter Casey and Mehdi Mekni. 2023. Rise of the metaverse\u2019s immersive virtual reality malware and the man-in-the-room attack & defenses. Computers & Security 127 (2023) 102923.","DOI":"10.1016\/j.cose.2022.102923"},{"key":"e_1_3_3_1_64_2","doi-asserted-by":"crossref","unstructured":"Jiawei Wang BoYu Gao Huawei Tu Hai-Ning Liang Zitao Liu Weiqi Luo and Jian Weng. 2024. Secure and memorable authentication using dynamic combinations of 3d objects in virtual reality. International Journal of Human\u2013Computer Interaction 40 17 (2024) 4608\u20134626.","DOI":"10.1080\/10447318.2023.2217608"},{"key":"e_1_3_3_1_65_2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966039"},{"key":"e_1_3_3_1_66_2","doi-asserted-by":"crossref","unstructured":"Sarah Weise and Andrew Mshar. 2016. Virtual reality and the banking experience. Journal of Digital Banking 1 2 (2016) 146\u2013152.","DOI":"10.69554\/JNZL5479"},{"key":"e_1_3_3_1_67_2","doi-asserted-by":"crossref","unstructured":"Cong Wu Kun He Jing Chen Ziming Zhao and Ruiying Du. 2021. Toward robust detection of puppet attacks via characterizing fingertip-touch behaviors. IEEE Transactions on Dependable and Secure Computing 19 6 (2021) 4002\u20134018.","DOI":"10.1109\/TDSC.2021.3116552"},{"key":"e_1_3_3_1_68_2","doi-asserted-by":"publisher","DOI":"10.1109\/APCCAS.2016.7804002"},{"key":"e_1_3_3_1_69_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01473"},{"key":"e_1_3_3_1_70_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i12.17325"},{"key":"e_1_3_3_1_71_2","doi-asserted-by":"crossref","unstructured":"Man Zhou Qian Wang Qi Li Wenyu Zhou Jingxiao Yang and Chao Shen. 2024. Securing face liveness detection on mobile devices using unforgeable lip motion patterns. IEEE Transactions on Mobile Computing 23 10 (2024) 9772\u20139788.","DOI":"10.1109\/TMC.2024.3367781"}],"event":{"name":"VRST '25: 31st ACM Symposium on Virtual Reality Software and Technology","location":"Montreal QC Canada","acronym":"VRST '25","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGGRAPH ACM Special Interest Group on Computer Graphics and Interactive Techniques"]},"container-title":["Proceedings of the 2025 31st ACM Symposium on Virtual Reality Software and Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3756884.3766052","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T09:07:52Z","timestamp":1764925672000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3756884.3766052"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,12]]},"references-count":70,"alternative-id":["10.1145\/3756884.3766052","10.1145\/3756884"],"URL":"https:\/\/doi.org\/10.1145\/3756884.3766052","relation":{},"subject":[],"published":{"date-parts":[[2025,11,12]]},"assertion":[{"value":"2025-12-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}