Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security 2013
DOI: 10.1145/2484313.2484357
|View full text |Cite
|
Sign up to set email alerts
|
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 27 publications
(14 citation statements)
references
References 8 publications
0
14
0
Order By: Relevance
“…Other researchers have explored the security challenges raised by QR and barcodes, including attacks enabled by ambiguous decoding protocols [7], a study of people's susceptibility to QR code based phishing attacks [32], the potential use of QR codes to spread malware and phishing URLs [35], and other attacks [16]. While these attacks are all technically possible, how prevalent are they in practice?…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Other researchers have explored the security challenges raised by QR and barcodes, including attacks enabled by ambiguous decoding protocols [7], a study of people's susceptibility to QR code based phishing attacks [32], the potential use of QR codes to spread malware and phishing URLs [35], and other attacks [16]. While these attacks are all technically possible, how prevalent are they in practice?…”
Section: Background and Related Workmentioning
confidence: 99%
“…Prior work [32,35] has suggested that QR codes are a promising vector for distributing malicious URLs. Intuitively, QR codes seem like a natural conduit for phishing attacks or the distribution of malware (e.g., sending users to drive-by-download sites).…”
Section: Malicious Usesmentioning
confidence: 99%
“…Yao et al [45] analyzed the most frequently downloaded QR code readers for Android and found that most of the readers are not able to successfully detect phishing attacks. However, a more detailed analysis on security, privacy and usability factors is necessary in order to design software that supports the user's decision making process about the trustworthiness of a URL.…”
Section: Usable Security Design Guidelinesmentioning
confidence: 99%
“…In addition to content preprocessing before display, verification tools should be emphasized such as e.g. blacklists as proposed in [45]. As the results from [14] and [3] suggest, warnings are in many cases not effective to inform the user about possible threats and the implications of the actions they will perform.…”
Section: Usable Security Design Guidelinesmentioning
confidence: 99%
“…One effort has studied user susceptibility to malicious QR codes physically posted in public areas [34]. Furthermore, current status of existing QR code scanners in terms of their detection of malicious URLs have also been investigated [35]. However, to our knowledge, prior work has heretofore not measured the extent of the threat posed by malicious QR codes on the public web as a vector for attacks against mobile device users.…”
Section: Related Workmentioning
confidence: 99%