Skip to main content

Showing 1–6 of 6 results for author: Hosfelt, D

Searching in archive cs. Search in all archives.
.
  1. A privacy-preserving approach to streaming eye-tracking data

    Authors: Brendan David-John, Diane Hosfelt, Kevin Butler, Eakta Jain

    Abstract: Eye-tracking technology is being increasingly integrated into mixed reality devices. Although critical applications are being enabled, there are significant possibilities for violating user privacy expectations. We show that there is an appreciable risk of unique user identification even under natural viewing conditions in virtual reality. This identification would allow an app to connect a user's… ▽ More

    Submitted 19 March, 2021; v1 submitted 2 February, 2021; originally announced February 2021.

    Comments: 12 pages, 4 figures, to appear in IEEE TVCG Special Issue on IEEE VR 2021

  2. arXiv:2011.03570  [pdf, other

    cs.HC

    Look Before You Leap: Trusted User Interfaces for the Immersive Web

    Authors: Diane Hosfelt, Jessica Outlaw, Tyesha Snow, Sara Carbonneau

    Abstract: Part of what makes the web successful is that anyone can publish content and browsers maintain certain safety guarantees. For example, it's safe to travel between links and make other trust decisions on the web because users can always identify the location they are at. If we want virtual and augmented reality to be successful, we need that same safety. On the traditional, two-dimensional (2D) web… ▽ More

    Submitted 6 November, 2020; originally announced November 2020.

  3. arXiv:2007.10246  [pdf, ps, other

    cs.CR cs.CY cs.HC

    Addressing the Privacy Implications of Mixed Reality: A Regulatory Approach

    Authors: Nicole Shadowen, Diane Hosfelt

    Abstract: Mixed reality (MR) technologies are emerging into the mainstream with affordable devices like the Oculus Quest. These devices blend the physical and virtual in novel ways that blur the lines that exist in legal precedent, like those between speech and conduct. In this paper, we discuss the challenges of regulating immersive technologies, focusing on the potential for extensive data collection, and… ▽ More

    Submitted 20 July, 2020; originally announced July 2020.

    Comments: Presented at the CHI 2020 Workshop on Exploring Potentially Abusive Ethical, Social and Political Implications of Mixed Reality Research in HCI (https://chi2020.acm.org/accepted-workshops/#W37)

  4. arXiv:2007.10235  [pdf, ps, other

    cs.HC cs.CY

    Privacy Implications of Eye Tracking in Mixed Reality

    Authors: Diane Hosfelt, Nicole Shadowen

    Abstract: Mixed Reality (MR) devices require a world with always-on sensors and real-time processing applied to their outputs. We have grappled with some of the ethical concerns presented by this scenario, such as bystander privacy issues with smartphones and cameras. However, MR technologies demand that we define and defend privacy in this new paradigm. This paper focuses on the challenges presented by eye… ▽ More

    Submitted 20 July, 2020; originally announced July 2020.

    Comments: Presented at CHI Workshop on Exploring Potentially Abusive Ethical Social and Political Implications of Mixed Reality Research in HCI (https://chi2020.acm.org/accepted-workshops/#W37)

  5. arXiv:1905.06995  [pdf, ps, other

    cs.HC

    Making ethical decisions for the immersive web

    Authors: Diane Hosfelt

    Abstract: Mixed reality (MR) ethics occupies a space that intersects with web ethics, emerging tech ethics, healthcare ethics and product ethics (among others). This paper focuses on how we can build an immersive web that encourages ethical development and usage. The technology is beyond emerging (footnote: generally, the ethics of emerging technologies are focused on ethical assessments of research and inn… ▽ More

    Submitted 14 May, 2019; originally announced May 2019.

  6. arXiv:1503.01186  [pdf, ps, other

    cs.CR

    Automated detection and classification of cryptographic algorithms in binary programs through machine learning

    Authors: Diane Duros Hosfelt

    Abstract: Threats from the internet, particularly malicious software (i.e., malware) often use cryptographic algorithms to disguise their actions and even to take control of a victim's system (as in the case of ransomware). Malware and other threats proliferate too quickly for the time-consuming traditional methods of binary analysis to be effective. By automating detection and classification of cryptograph… ▽ More

    Submitted 3 March, 2015; originally announced March 2015.

    Comments: Thesis submitted in partial fulfillment of MSE CS degree at Johns Hopkins University, 25 pages