Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3597503.3639082acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

An Empirical Study on Oculus Virtual Reality Applications: Security and Privacy Perspectives

Published: 12 April 2024 Publication History

Abstract

Although Virtual Reality (VR) has accelerated its prevalent adoption in emerging metaverse applications, it is not a fundamentally new technology. On one hand, most VR operating systems (OS) are based on off-the-shelf mobile OS (e.g., Android). As a result, VR apps also inherit privacy and security deficiencies from conventional mobile apps. On the other hand, in contrast to conventional mobile apps, VR apps can achieve immersive experience via diverse VR devices, such as head-mounted displays, body sensors, and controllers though achieving this requires the extensive collection of privacy-sensitive human biometrics (e.g., hand-tracking and face-tracking data). Moreover, VR apps have been typically implemented by 3D gaming engines (e.g., Unity), which also contain intrinsic security vulnerabilities. Inappropriate use of these technologies may incur privacy leaks and security vulnerabilities although these issues have not received significant attention compared to the proliferation of diverse VR apps. In this paper, we develop a security and privacy assessment tool, namely the VR-SP detector for VR apps. The VR-SP detector has integrated program static analysis tools and privacy-policy analysis methods. Using the VR-SP detector, we conduct a comprehensive empirical study on 500 popular VR apps. We obtain the original apps from the popular Oculus and SideQuest app stores and extract APK files via the Meta Oculus Quest 2 device. We evaluate security vulnerabilities and privacy data leaks of these VR apps by VR app analysis, taint analysis, and privacy-policy analysis. We find that a number of security vulnerabilities and privacy leaks widely exist in VR apps. Moreover, our results also reveal conflicting representations in the privacy policies of these apps and inconsistencies of the actual data collection with the privacy-policy statements of the apps. Based on these findings, we make suggestions for the future development of VR apps.

References

[1]
2020. dnSpy. https://github.com/dnSpy/dnSpy
[2]
Maha Alghawazi, Daniyal Alghazzawi, and Suaad Alarifi. 2022. Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review. Journal of Cybersecurity and Privacy 2, 4 (2022), 764--777.
[3]
Benjamin Andow, Samin Yaseer Mahmud, Wenyu Wang, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, and Tao Xie. 2019. PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 585--602. https://www.usenix.org/conference/usenixsecurity19/presentation/andow
[4]
Benjamin Andow, Samin Yaseer Mahmud, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, and Serge Egelman. 2020. Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 985--1002. https://www.usenix.org/conference/usenixsecurity20/presentation/andow
[5]
Vincent Ang and Lwin Khin Shar. 2021. COVID-19 One Year on - Security and Privacy Review of Contact Tracing Mobile Apps. IEEE Pervasive Computing 20, 4 (2021), 61--70.
[6]
Andrew W. Appel. 2015. Verification of a Cryptographic Primitive: SHA-256. ACM Trans. Program. Lang. Syst. 37, 2, Article 7 (apr 2015), 31 pages.
[7]
Steven Arzt, Siegfried Rasthofer, Christian Fritz, Eric Bodden, Alexandre Bartel, Jacques Klein, Yves Le Traon, Damien Octeau, and Patrick McDaniel. 2014. Flow-Droid: Precise Context, Flow, Field, Object-Sensitive and Lifecycle-Aware Taint Analysis for Android Apps. In Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation (Edinburgh, United Kingdom) (PLDI '14). Association for Computing Machinery, New York, NY, USA, 259--269.
[8]
Jaime Benjumea, Jorge Ropero, Octavio Rivera-Romero, Enrique Dorronzoro-Zubiete, and Alejandro Carrasco. 2020. Assessment of the Fairness of Privacy Policies of Mobile Health Apps: Scale Development and Evaluation in Cancer Apps. JMIR Mhealth Uhealth 8, 7 (28 Jul 2020), e17134.
[9]
GDPRWise BV. 2023. GDPRWise Policy Checker. https://gdprwise.eu/policy-checker/
[10]
Peter Casey, Ibrahim Baggili, and Ananya Yarramreddy. 2021. Immersive Virtual Reality Attacks and the Human Joystick. IEEE Transactions on Dependable and Secure Computing 18, 2 (2021), 550--562.
[11]
Cheng Chang, Huaxin Li, Yichi Zhang, Suguo Du, Hui Cao, and Haojin Zhu. 2019. Automated and Personalized Privacy Policy Extraction Under GDPR Consideration. In Wireless Algorithms, Systems, and Applications, Edoardo S. Biagioni, Yao Zheng, and Siyao Cheng (Eds.). Springer International Publishing, Cham, 43--54.
[12]
Ruizhi Cheng, Nan Wu, Songqing Chen, and Bo Han. 2022. Reality Check of Metaverse: A First Look at Commercial Social Virtual Reality Platforms. In 2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW). 141--148.
[13]
Alvin Christopher Santoso and Petrus Santoso. 2022. Aplikasi Ruangan Maya Berbasis Android OS pada Headset Virtual Reality Oculus Quest 2. Jurnal FORTECH 3, 2 (Sep. 2022), 51--56.
[14]
Mauro Conti, Nicola Dragoni, and Viktor Lesyk. 2016. A Survey of Man In The Middle Attacks. IEEE Communications Surveys & Tutorials 18, 3 (2016), 2027--2051.
[15]
Carlos Cortés, Pablo Pérez, and Narciso García. 2019. Unity3D-based app for 360VR subjective quality assessment with customizable questionnaires. In 2019 IEEE 9th International Conference on Consumer Electronics (ICCE-Berlin). 281--282.
[16]
Hesham Darvish and Mohammad Husain. 2018. Security Analysis of Mobile Money Applications on Android. In 2018 IEEE International Conference on Big Data (Big Data). 3072--3078.
[17]
Anthony Desnos and G Gueguen. 2018. Androguard documentation. https://androguard.readthedocs.io/en/latest/
[18]
David Devecsery, Peter M. Chen, Jason Flinn, and Satish Narayanasamy. 2018. Optimistic Hybrid Analysis: Accelerating Dynamic Analysis through Predicated Static Analysis. SIGPLAN Not. 53, 2 (mar 2018), 348--362.
[19]
Ibrahim F. Elashry, Osama S. Farag Allah, Alaa M. Abbas, and S. El-Rabaie. 2009. A new diffusion mechanism for data encryption in the ECB mode. In 2009 International Conference on Computer Engineering & Systems. 288--293.
[20]
Inc. Epic Games. [n. d.]. Unreal Engine. https://www.unrealengine.com/ (2023, July 24).
[21]
Sandeep HR. 2019. Static Analysis of Android Malware Detection using Deep Learning. In 2019 International Conference on Intelligent Computing and Control Systems (ICCS). 841--845.
[22]
Xinyue Huang, Anmin Zhou, Peng Jia, Luping Liu, and Liang Liu. 2019. Fuzzing the Android Applications With HTTP/HTTPS Network Data. IEEE Access 7 (2019), 59951--59962.
[23]
Yan Huang, Yi Joy Li, and Zhipeng Cai. 2023. Security and Privacy in Metaverse: A Comprehensive Survey. Big Data Mining and Analytics 6, 2 (2023), 234--247.
[24]
James P. Hughes and Whitfield Diffie. 2022. The Challenges of IoT, TLS, and Random Number Generators in the Real World: Bad Random Numbers Are Still with Us and Are Proliferating in Modern Systems. Queue 20, 3 (jul 2022), 18--40.
[25]
Jing Hui, Yueliang Zhou, Mohamed Oubibi, Weifeng Di, Lixin Zhang, and Sijia Zhang. 2022. Research on Art Teaching Practice Supported by Virtual Reality (VR) Technology in the Primary Schools. Sustainability 14, 3 (2022).
[26]
Thien Huynh-The, Quoc-Viet Pham, Xuan-Qui Pham, Thanh Thi Nguyen, Zhu Han, and Dong-Seong Kim. 2023. Artificial intelligence for the metaverse: A survey. Engineering Applications of Artificial Intelligence 117 (2023), 105581.
[27]
Fortune Business Insights. 2023. Virtual Reality Market Size, Share and COVID-19 Impact Analysis, By Component (Hardware, Software, and Content), By Device Type (Head Mounted Display (HMD), VR Simulator, VR Glasses, Treadmills and Haptic Gloves, and Others), By Industry (Gaming, Entertainment, Automotive, Retail, Healthcare, Education, Aerospace and Defense, Manufacturing, and Others), and Regional Forecast, 2023-2030. https://www.fortunebusinessinsights.com/industry-reports/virtual-reality-market-101378
[28]
Konrad Kollnig, Pierre Dewitte, Max Van Kleek, Ge Wang, Daniel Omeiza, Helena Webb, and Nigel Shadbolt. 2021. A Fait Accompli? An Empirical Study into the Absence of Consent to Third-Party Tracking in Android Apps. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). USENIX Association, 181--196. https://www.usenix.org/conference/soups2021/presentation/kollnig
[29]
Grace LaMalva and Suzanna Schmeelk. 2020. MobSF: Mobile Health Care Android Applications Through The Lens of Open Source Static Analysis. In 2020 IEEE MIT Undergraduate Research Technology Conference (URTC). 1--4.
[30]
Jungmi Lee. 2022. A study on the intention and experience of using the metaverse. Jahr: Europski časopis za bioetiku 13, 1 (2022), 177--192.
[31]
Sungho Lee, Julian Dolby, and Sukyoung Ryu. 2016. HybriDroid: Static Analysis Framework for Android Hybrid Applications. In Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering (Singapore, Singapore) (ASE '16). Association for Computing Machinery, New York, NY, USA, 250--261.
[32]
Douglas J. Leith and Stephen Farrell. 2021. Contact Tracing App Privacy: What Data Is Shared By Europe's GAEN Contact Tracing Apps. In IEEE INFOCOM 2021 - IEEE Conference on Computer Communications. 1--10.
[33]
He Li, Lu Yu, and Wu He. 2019. The Impact of GDPR on Global Technology Development. Journal of Global Information Technology Management 22, 1 (2019), 1--6. arXiv:https://doi.org/10.1080/1097198X.2019.1569186
[34]
Song Liao, Christin Wilson, Long Cheng, Hongxin Hu, and Huixing Deng. 2020. Measuring the Effectiveness of Privacy Policies for Voice Assistant Applications. In Annual Computer Security Applications Conference (Austin, USA) (ACSAC '20). Association for Computing Machinery, New York, NY, USA, 856--869.
[35]
Zhuo Ma, Haoran Ge, Yang Liu, Meng Zhao, and Jianfeng Ma. 2019. A Combination Method for Android Malware Detection Based on Control Flow Graphs and Machine Learning Algorithms. IEEE Access 7 (2019), 21235--21245.
[36]
Tahrima Mustafa, Richard Matovu, Abdul Serwadda, and Nicholas Muirhead. 2018. Unsure How to Authenticate on Your VR Headset? Come on, Use Your Head!. In Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics (Tempe, AZ, USA) (IWSPA '18). Association for Computing Machinery, New York, NY, USA, 23--30.
[37]
Stylianos Mystakidis. 2022. Metaverse. Encyclopedia 2, 1 (2022), 486--497.
[38]
Huansheng Ning, Hang Wang, Yujia Lin, Wenxi Wang, Sahraoui Dhelim, Fadi Farha, Jianguo Ding, and Mahmoud Daneshmand. 2021. A Survey on Metaverse: the State-of-the-art, Technologies, Applications, and Challenges. arXiv preprint arXiv:2111.09673 (2021).
[39]
Fariha Nusrat, Foyzul Hassan, Hao Zhong, and Xiaoyin Wang. 2021. How Developers Optimize Virtual Reality Applications: A Study of Optimization Commits in Open Source Unity Projects. In 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE). 473--485.
[40]
Marten Oltrogge, Nicolas Huaman, Sabrina Amft, Yasemin Acar, Michael Backes, and Sascha Fahl. 2021. Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 4347--4364. https://www.usenix.org/conference/usenixsecurity21/presentation/oltrogge
[41]
Sang-Min Park and Young-Gab Kim. 2022. A Metaverse: Taxonomy, Components, Applications, and Open Challenges. IEEE Access 10 (2022), 4209--4251.
[42]
Weichao Qiu and Alan Yuille. 2016. UnrealCV: Connecting Computer Vision to Unreal Engine. In Computer Vision - ECCV 2016 Workshops, Gang Hua and Hervé Jégou (Eds.). Springer International Publishing, Cham, 909--916.
[43]
Joel Reardon, Álvaro Feal, Primal Wijesekera, Amit Elazari Bar On, Narseo Vallina-Rodriguez, and Serge Egelman. 2019. 50 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions System. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 603--620. https://www.usenix.org/conference/usenixsecurity19/presentation/reardon
[44]
Chuangang Ren, Yulong Zhang, Hui Xue, Tao Wei, and Peng Liu. 2015. Towards Discovering and Understanding Task Hijacking in Android. In Proceedings of the 24th USENIX Conference on Security Symposium (Washington, D.C.) (SEC'15). USENIX Association, USA, 945--959.
[45]
Ashish Rajendra Sai, Jim Buckley, and Andrew Le Gear. 2019. Privacy and Security Analysis of Cryptocurrency Mobile Applications. In 2019 Fifth Conference on Mobile and Secure Services (MobiSecServ). 1--6.
[46]
Faysal Hossain Shezan, Syeda Farzia Afroze, and Anindya Iqbal. 2017. Vulnerability detection in recent Android apps: An empirical study. In 2017 International Conference on Networking, Systems and Security (NSysS). 55--63.
[47]
Jaewoo Shim, Kyeonghwan Lim, Seong-je Cho, Sangchul Han, and Minkyu Park. 2018. Static and dynamic analysis of Android malware and goodware written with unity framework. Security and Communication Networks 2018 (2018).
[48]
Shao Shuai, Dong Guowei, Guo Tao, Yang Tianchang, and Shi Chenjie. 2014. Modelling Analysis and Auto-detection of Cryptographic Misuse in Android Applications. In 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing. 75--80.
[49]
Lee Stemkoski. 2015. The LibGDX Framework. Apress, Berkeley, CA, 13--46.
[50]
Ruoxi Sun, Wei Wang, Minhui Xue, Gareth Tyson, Seyit Camtepe, and Damith C. Ranasinghe. 2021. An Empirical Assessment of Global COVID-19 Contact Tracing Applications. In 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE). 1085--1097.
[51]
San-Tsai Sun, Andrea Cuadros, and Konstantin Beznosov. 2015. Android Rooting: Methods, Detection, and Evasion. In Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (Denver, Colorado, USA) (SPSM '15). Association for Computing Machinery, New York, NY, USA, 3--14.
[52]
Unity Technologies. [n. d.]. Unity documentation - 2d or 3d projects. https://docs.unity3d.com/ (2023, March 24).
[53]
Rahmadi Trimananda, Hieu Le, Hao Cui, Janice Tran Ho, Anastasia Shuba, and Athina Markopoulou. 2022. OVRseen: Auditing Network Traffic and Privacy Policies in Oculus VR. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 3789--3806. https://www.usenix.org/conference/usenixsecurity22/presentation/trimananda
[54]
Luca Verderame, Davide Caputo, Andrea Romdhana, and Alessio Merlo. 2020. On the (Un)Reliability of Privacy Policies in Android Apps. In 2020 International Joint Conference on Neural Networks (IJCNN). 1--9.
[55]
Sasha Volokh and William G.J. Halfond. 2022. Static Analysis for Automated Identification of Valid Game Actions During Exploration. In Proceedings of the 17th International Conference on the Foundations of Digital Games (Athens, Greece) (FDG '22). Association for Computing Machinery, New York, NY, USA, Article 2, 10 pages.
[56]
Martin Vondráček, Ibrahim Baggili, Peter Casey, and Mehdi Mekni. 2023. Rise of the Metaverse's Immersive Virtual Reality Malware and the Man-in-the-Room Attack & Defenses. Computers & Security 127 (2023), 102923.
[57]
Isabell Wohlgenannt, Alexander Simons, and Stefan Stieglitz. 2020. Virtual reality. Business & Information Systems Engineering 62 (2020), 455--461.
[58]
Yi Wu, Cong Shi, Tianfang Zhang, Payton Walker, Jian Liu, Nitesh Saxena, and Yingying Chen. 2023. Privacy Leakage via Unrestricted Motion-Position Sensors in the Age of Virtual Reality: A Study of Snooping Typed Input on Virtual Keyboards. In 2023 IEEE Symposium on Security and Privacy (SP). 3382--3398.
[59]
Xiaoyi Yang and Xueling Zhang. 2023. A Study of User Privacy in Android Mobile AR Apps. In Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering (Rochester, MI, USA) (ASE '22). Association for Computing Machinery, New York, NY, USA, Article 226, 5 pages.
[60]
Ananya Yarramreddy, Peter Gromkowski, and Ibrahim Baggili. 2018. Forensic Analysis of Immersive Virtual Reality Social Applications: A Primary Account. In 2018 IEEE Security and Privacy Workshops (SPW). 186--196.
[61]
Sophia Yoo and Xiaoqi Chen. 2021. Secure Keyed Hashing on Programmable Switches. In Proceedings of the ACM SIGCOMM 2021 Workshop on Secure Programmable Network INfrastructure (Virtual Event, USA) (SPIN '21). Association for Computing Machinery, New York, NY, USA, 16--22.
[62]
Hang Zhang, Dongdong She, and Zhiyun Qian. 2015. Android Root and Its Providers: A Double-Edged Sword. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (Denver, Colorado, USA) (CCS '15). Association for Computing Machinery, New York, NY, USA, 1093--1104.
[63]
Hao Zhou, Haoyu Wang, Yajin Zhou, Xiapu Luo, Yutian Tang, Lei Xue, and Ting Wang. 2021. Demystifying Diehard Android Apps. In Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering (Virtual Event, Australia) (ASE '20). Association for Computing Machinery, New York, NY, USA, 187--198.
[64]
Chaoshun Zuo and Zhiqiang Lin. 2022. Playing Without Paying: Detecting Vulnerable Payment Verification in Native Binaries of Unity Mobile Games. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 3093--3110. https://www.usenix.org/conference/usenixsecurity22/presentation/zuo

Cited By

View all
  • (2024)A Study of Code Clone on Open Source VR SoftwareProceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering Workshops10.1145/3691621.3694957(239-244)Online publication date: 27-Oct-2024

Index Terms

  1. An Empirical Study on Oculus Virtual Reality Applications: Security and Privacy Perspectives

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software Engineering
    May 2024
    2942 pages
    ISBN:9798400702174
    DOI:10.1145/3597503
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    In-Cooperation

    • Faculty of Engineering of University of Porto

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 12 April 2024

    Check for updates

    Author Tags

    1. virtual reality
    2. metaverse
    3. static analysis
    4. security and privacy

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    ICSE '24
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 276 of 1,856 submissions, 15%

    Upcoming Conference

    ICSE 2025

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)223
    • Downloads (Last 6 weeks)40
    Reflects downloads up to 16 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A Study of Code Clone on Open Source VR SoftwareProceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering Workshops10.1145/3691621.3694957(239-244)Online publication date: 27-Oct-2024

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media