{"id":"https://openalex.org/W4404915021","doi":"https://doi.org/10.1109/ismar-adjunct64951.2024.00017","title":"Breaking the Virtual Barrier of Exploit Chain Attacks in XR Systems","display_name":"Breaking the Virtual Barrier of Exploit Chain Attacks in XR Systems","publication_year":2024,"publication_date":"2024-10-21","ids":{"openalex":"https://openalex.org/W4404915021","doi":"https://doi.org/10.1109/ismar-adjunct64951.2024.00017"},"language":"en","primary_location":{"id":"doi:10.1109/ismar-adjunct64951.2024.00017","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ismar-adjunct64951.2024.00017","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023052612","display_name":"Asif Uz Zaman Asif","orcid":null},"institutions":[{"id":"https://openalex.org/I92446798","display_name":"Colorado State University","ror":"https://ror.org/03k1gpj17","country_code":"US","type":"education","lineage":["https://openalex.org/I92446798"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Asif Uz Zaman Asif","raw_affiliation_strings":["Colorado State University,Fort Collins,CO,USA,80523"],"affiliations":[{"raw_affiliation_string":"Colorado State University,Fort Collins,CO,USA,80523","institution_ids":["https://openalex.org/I92446798"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045593113","display_name":"Meera Sridhar","orcid":"https://orcid.org/0000-0002-7508-5024"},"institutions":[{"id":"https://openalex.org/I92446798","display_name":"Colorado State University","ror":"https://ror.org/03k1gpj17","country_code":"US","type":"education","lineage":["https://openalex.org/I92446798"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Meera Sridhar","raw_affiliation_strings":["Colorado State University,Fort Collins,CO,USA,80523"],"affiliations":[{"raw_affiliation_string":"Colorado State University,Fort Collins,CO,USA,80523","institution_ids":["https://openalex.org/I92446798"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008904412","display_name":"Indrakshi Ray","orcid":"https://orcid.org/0000-0002-0714-7676"},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Indrakshi Ray","raw_affiliation_strings":["University of North Carolina,Charlotte,NC,USA,28223"],"affiliations":[{"raw_affiliation_string":"University of North Carolina,Charlotte,NC,USA,28223","institution_ids":["https://openalex.org/I102149020"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5066870045","display_name":"Francisco R. Ortega","orcid":"https://orcid.org/0000-0002-2449-3802"},"institutions":[{"id":"https://openalex.org/I92446798","display_name":"Colorado State University","ror":"https://ror.org/03k1gpj17","country_code":"US","type":"education","lineage":["https://openalex.org/I92446798"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Francisco R. Ortega","raw_affiliation_strings":["Colorado State University,Fort Collins,CO,USA,80523"],"affiliations":[{"raw_affiliation_string":"Colorado State University,Fort Collins,CO,USA,80523","institution_ids":["https://openalex.org/I92446798"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5023052612"],"corresponding_institution_ids":["https://openalex.org/I92446798"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.24756496,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"32","last_page":"34"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.965499997138977,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.8700953722000122},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6055571436882019},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4934905767440796}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.8700953722000122},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6055571436882019},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4934905767440796}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ismar-adjunct64951.2024.00017","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ismar-adjunct64951.2024.00017","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","score":0.4399999976158142,"display_name":"Climate action"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W2910870188","https://openalex.org/W4385448008","https://openalex.org/W4391316879","https://openalex.org/W4391725312","https://openalex.org/W4394769792","https://openalex.org/W4399324592","https://openalex.org/W6801750132","https://openalex.org/W6843007356","https://openalex.org/W6863102946"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W17155033","https://openalex.org/W3048799479","https://openalex.org/W3006507989","https://openalex.org/W2779961139","https://openalex.org/W4240241597","https://openalex.org/W2763500028","https://openalex.org/W4240288358"],"abstract_inverted_index":{"Extended":[0],"Reality":[1],"(XR)":[2],"is":[3,64,105],"an":[4],"emerging":[5],"technology":[6],"that":[7,45,70,92],"will":[8],"soon":[9],"be":[10],"a":[11,24,53,78,93],"ubiquitous":[12],"part":[13],"of":[14,20,48,52,73,83,95,101],"daily":[15],"life.":[16],"However,":[17],"the":[18,38,81,90,114],"security":[19],"these":[21,31],"systems":[22,32,41,88],"remains":[23],"major":[25],"concern":[26],"as":[27],"attackers":[28],"can":[29,56],"target":[30],"and":[33,89],"get":[34],"vital":[35],"information":[36],"about":[37],"user.":[39],"XR":[40,96,123],"integrate":[42],"advanced":[43],"sensors":[44],"are":[46,68],"capable":[47],"collecting":[49],"identifiable":[50],"data":[51],"user":[54],"which":[55],"have":[57],"devastating":[58],"effects.":[59],"One":[60],"particularly":[61],"concerning":[62],"threat":[63],"exploit":[65,119],"chain":[66,120],"attacks":[67,69,85,121],"use":[71],"chains":[72],"multiple":[74],"exploits":[75],"to":[76],"compromise":[77],"system.":[79],"Given":[80],"history":[82],"similar":[84],"on":[86,122],"Android":[87],"fact":[91],"lot":[94],"headsets":[97],"run":[98],"some":[99],"version":[100],"Android,":[102],"this":[103,109],"vulnerability":[104],"especially":[106],"relevant.":[107],"In":[108],"position":[110],"paper,":[111],"we":[112],"examine":[113],"potential":[115],"problems":[116],"associated":[117],"with":[118],"headsets.":[124]},"counts_by_year":[],"updated_date":"2025-12-22T23:10:17.713674","created_date":"2025-10-10T00:00:00"}
