BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
DTSTART:20250309T030000
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:EDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20251102T010000
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:EST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20250626T195330Z
UID:B289AB44-737F-4641-9DBB-FE23ECCB4867
DTSTART;TZID=America/New_York:20250619T200000
DTEND;TZID=America/New_York:20250619T210000
DESCRIPTION:AR/VR devices promise a new era of immersive computing\, where 
 our everyday experience is augmented with helpful information (Augmented R
 eality)\, or where we are immersed in fully virtual worlds (Virtual Realit
 y). These systems fuse the physical world\, and the virtual world\, throug
 h computing resources to provide these immersive experiences rendered on t
 he user&#39;s headset. As a result\, it allows new opportunities for attackers
  to compromise the security and privacy of users that are not well underst
 ood. Towards understanding the security and privacy challenges in these sy
 stems\, this talk presents a number of recent attacks we developed on AR/V
 R systems. One threat model exploits the shared computing resources used b
 y multiple applications on a headset to extract information through side c
 hannels\; we show attacks that spy on user activity or compromise privacy.
  Another threat model exploits the shared state among multiple users in a 
 multi-user application\, allowing malicious users to inject compromised in
 formation or to recover information they are not allowed to access. Other 
 threat models include those that interfere with applications and cause the
  virtual model to become out of sync with the physical world\, causing use
 r motion sickness or bypassing safety guardrails. I will conclude with dis
 cussion of potential defenses and ways to build more security AR/VR experi
 ences.\n\nCo-sponsored by: IEEE Montreal Section\n\nSpeaker(s): Dr. Nael A
 bu-Ghazaleh\n\nAgenda: \n20:00 Hours - START of Distinguished Lecture\n21:
 00 Hours - END of Distinguished Lecture\n21:00 Hours - Start of Q&amp;A\, Disc
 ussions\, Thoughts\, etc\n\nALL times are in EDT/EST format\n\nVirtual: ht
 tps://events.vtools.ieee.org/m/485331
LOCATION:Virtual: https://events.vtools.ieee.org/m/485331
ORGANIZER:rkrish@ieee.org
SEQUENCE:25
SUMMARY:Security and Privacy for Extended Reality Systems: Attacks and thre
 at models
URL;VALUE=URI:https://events.vtools.ieee.org/m/485331
X-ALT-DESC:Description: &lt;br /&gt;&lt;p&gt;AR/VR devices promise a new era of immersi
 ve computing\, where our everyday experience is augmented with helpful inf
 ormation (Augmented Reality)\, or where we are immersed in fully virtual w
 orlds (Virtual Reality).&amp;nbsp\; These systems fuse the physical world\, an
 d the virtual world\, through computing resources to provide these immersi
 ve experiences rendered on the user&#39;s headset.&amp;nbsp\; As a result\, it all
 ows new opportunities for attackers to compromise the security and privacy
  of users that are not well understood.&amp;nbsp\; Towards understanding the s
 ecurity and privacy challenges in these systems\, this talk presents a num
 ber of recent attacks we developed on AR/VR systems.&amp;nbsp\; One threat mod
 el exploits the shared computing resources used by multiple applications o
 n a headset to extract information through side channels\; we show attacks
  that spy on user activity or compromise privacy.&amp;nbsp\; Another threat mo
 del exploits the shared state among multiple users in a multi-user applica
 tion\, allowing malicious users to inject compromised information or to re
 cover information they are not allowed to access.&amp;nbsp\; Other threat mode
 ls include those that interfere with applications and cause the virtual mo
 del to become out of sync with the physical world\, causing user motion si
 ckness or bypassing safety guardrails.&amp;nbsp\;&amp;nbsp\; I will conclude with 
 discussion of potential&amp;nbsp\; defenses and ways to build more security AR
 /VR experiences.&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;Agenda: &lt;br /&gt;&lt;p&gt;20:00 Hours - START of Di
 stinguished Lecture&lt;br&gt;21:00 Hours - END of Distinguished Lecture&lt;br&gt;21:00
  Hours - Start of Q&amp;amp\;A\, Discussions\, Thoughts\, etc&lt;br&gt;&lt;br&gt;ALL times
  are in EDT/EST format&lt;/p&gt;
END:VEVENT
END:VCALENDAR

