Forensic Analysis of Immersive Virtual Reality Social Applications: A Primary Account

Our work presents the primary account for exploring the forensics of immersive Virtual Reality (VR) systems and their social applications. The Social VR applications studied in this work include Bigscreen, Altspace VR, Rec Room and Facebook Spaces. We explored the two most widely adopted consumer VR systems: the HTC Vive and the Oculus Rift. Our tests examined the efficacy of reconstructing evidence from network traffic as well as the systems themselves. The results showed that a significant amount of forensically relevant data such as user names, user profile pictures, events, and system details may be recovered. We anticipate that this work will stimulate future research directions in VR and Augmented Reality (AR) forensics as it is an area that is understudied and needs more attention from the community.

[1]  Jason Moore,et al.  Network and device forensic analysis of Android social-messaging applications , 2015, Digit. Investig..

[2]  Ibrahim M. Baggili,et al.  Forensic artifacts of Facebook's instant messaging service , 2011, 2011 International Conference for Internet Technology and Secured Transactions.

[3]  Marcus K. Rogers,et al.  Mobile Phone Forensics Tool Testing: A Database Driven Approach , 2007, Int. J. Digit. EVid..

[4]  Mike Dickson An examination into MSN Messenger 7.5 contact identification , 2006, Digit. Investig..

[5]  Mike Dickson An examination into Yahoo Messenger 7.0 contact identification , 2006, Digit. Investig..

[6]  Daryl Johnson,et al.  Third Party Application Forensics on Apple Mobile Devices , 2011, 2011 44th Hawaii International Conference on System Sciences.

[7]  Marwan Al-Zarouni Mobile handset forensic evidence: a challenge for law enforcement , 2006 .

[8]  Marcus K. Rogers,et al.  Forensic Analysis of Volatile Instant Messaging , 2008, IFIP Int. Conf. Digital Forensics.

[9]  Kim-Kwang Raymond Choo,et al.  An Android Social App Forensics Adversary Model , 2016, 2016 49th Hawaii International Conference on System Sciences (HICSS).

[10]  Mustafa Kaya,et al.  Hash Based Block Matching for Digital Evidence Image Files from Forensic Software Tools , 2017 .

[11]  Kim-Kwang Raymond Choo,et al.  Privacy Risks in Mobile Dating Apps , 2015, AMCIS.

[12]  Alexey Melnikov,et al.  The WebSocket Protocol , 2011, RFC.

[13]  Leysia Palen,et al.  Chatting with teenagers: Considering the place of chat technologies in teen life , 2006, TCHI.

[14]  Ibrahim M. Baggili,et al.  WhatsApp network forensics: Decrypting and understanding the WhatsApp call signaling messages , 2015, Digit. Investig..

[15]  Giuseppe Riva,et al.  Virtual reality: an experiential tool for clinical psychology , 2009 .

[16]  Aditya Mahajan,et al.  Forensic Analysis of Instant Messenger Applications on Android Devices , 2013, ArXiv.

[17]  Edgar R. Weippl,et al.  Network-Based Secret Communication in Clouds: A Survey , 2017, IEEE Communications Surveys & Tutorials.

[18]  Jessica Reust Case study: AOL instant messenger trace evidence , 2006, Digit. Investig..

[19]  Mike Dickson An examination into AOL Instant Messenger 5.5 contact identification , 2006, Digit. Investig..

[20]  Maria V. Sanchez-Vives,et al.  From presence to consciousness through virtual reality , 2005, Nature Reviews Neuroscience.

[21]  Alfred Kobsa,et al.  Privacy in instant messaging: an impression management model , 2012, Behav. Inf. Technol..

[22]  Ivan E. Sutherland,et al.  A head-mounted three dimensional display , 1968, AFIPS Fall Joint Computing Conference.

[23]  Mark A. Lemley,et al.  Law, Virtual Reality, and Augmented Reality , 2018 .

[24]  James N. Danziger,et al.  IM = Interruption Management? Instant Messaging and Disruption in the Workplace , 2007, J. Comput. Mediat. Commun..

[25]  Edgar R. Weippl,et al.  Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications , 2012, NDSS.