TY - GEN
T1 - Stealthy Privacy Attacks Against Mobile AR Apps
AU - Lehman, Sarah M.
AU - Alrumayh, Abrar S.
AU - Ling, Haibin
AU - Tan, Chiu C.
N1 - Publisher Copyright:
© 2020 IEEE.
PY - 2020/6
Y1 - 2020/6
N2 - The proliferation of mobile augmented reality applications and the toolkits to create them have serious implications for user privacy. In this paper, we explore how malicious AR app developers can leverage capabilities offered by commercially available AR libraries, and describe how edge computing can be used to address this privacy problem.
AB - The proliferation of mobile augmented reality applications and the toolkits to create them have serious implications for user privacy. In this paper, we explore how malicious AR app developers can leverage capabilities offered by commercially available AR libraries, and describe how edge computing can be used to address this privacy problem.
UR - http://www.scopus.com/inward/record.url?scp=85090128405&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85090128405&partnerID=8YFLogxK
U2 - 10.1109/CNS48642.2020.9162330
DO - 10.1109/CNS48642.2020.9162330
M3 - Conference contribution
AN - SCOPUS:85090128405
T3 - 2020 IEEE Conference on Communications and Network Security, CNS 2020
BT - 2020 IEEE Conference on Communications and Network Security, CNS 2020
T2 - 2020 IEEE Conference on Communications and Network Security, CNS 2020
Y2 - 29 June 2020 through 1 July 2020
ER -