Is Your Cat Infected with a Computer Virus?
PERCOM '06 Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications
COMPSAC '07 Proceedings of the 31st Annual International Computer Software and Applications Conference - Volume 02
Utilizing QR Code and Mobile Phones for Blinds and Visually Impaired People
ICCHP '08 Proceedings of the 11th international conference on Computers Helping People with Special Needs
A 2D Barcode-Based Mobile Payment System
MUE '09 Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering
Dynamic 2D-barcodes for multi-device Web session migration including mobile phones
Personal and Ubiquitous Computing
Ubiquitous information transfer across different platforms by QR codes
Journal of Mobile Multimedia
Using QR codes for enhancing the scope of digital government services
Proceedings of the 13th Annual International Conference on Digital Government Research
Towards preventing QR code based attacks on android phone using security warnings
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
A Model for the Analysis of QoS and Security Tradeoff in Mobile Platforms
Mobile Networks and Applications
Hi-index | 0.00 |
This paper examines QR Codes and how they can be used to attack both human interaction and automated systems. As the encoded information is intended to be machine readable only, a human cannot distinguish between a valid and a maliciously manipulated QR code. While humans might fall for phishing attacks, automated readers are most likely vulnerable to SQL injections and command injections. Our contribution consists of an analysis of the QR Code as an attack vector, showing different attack strategies from the attackers point of view and exploring their possible consequences.