Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia 2010
DOI: 10.1145/1971519.1971593
|View full text |Cite
|
Sign up to set email alerts
|

QR code security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
54
0
3

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 127 publications
(68 citation statements)
references
References 10 publications
0
54
0
3
Order By: Relevance
“…Even though people might fall for QR code leveraged phishing attacks there are other possible weaknesses that QR codes can possibly exploit [7]. Specifically, QR codes can be used for SQL injection and command injection attacks in automated readers-programs that extract information from QR-codes.…”
Section: Leveraging Qr Codes For Malicious Purposementioning
confidence: 99%
See 1 more Smart Citation
“…Even though people might fall for QR code leveraged phishing attacks there are other possible weaknesses that QR codes can possibly exploit [7]. Specifically, QR codes can be used for SQL injection and command injection attacks in automated readers-programs that extract information from QR-codes.…”
Section: Leveraging Qr Codes For Malicious Purposementioning
confidence: 99%
“…QR codes can be used in several different types of attacks such as social engineering and automated processes attacks. Automated processes attacks are executed by exploiting SQL injection vulnerabilities, command injection, as well as Cross-Site Scripting (XSS) attacks [7].…”
Section: Introductionmentioning
confidence: 99%
“…Version 40, which produces the largest QR code, has 23,648, hence 4296 alphanumeric characters [32], [37] can be encoded. Figure 1 shows an example of a version 2 QR code, which is the most commonly used one [27], [34], [40], [15]. In addition to alphanumeric characters, QR codes can encode binaries, Kanjis 1 or control codes.…”
Section: The Qr Code Standardmentioning
confidence: 99%
“…The attacker modifies individual modules of a QR code. The main idea of this modification is that the encoded content is modified solely by changing the color of specific modules of the QR Code to which the user will be directed after scanning the code as proposed in [27]. …”
Section: Qr Codes As Attack Vectorsmentioning
confidence: 99%
See 1 more Smart Citation