2020
DOI: 10.3390/info11040217
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy of QR Code Applications: A Comprehensive Study, General Guidelines and Solutions

Abstract: The widespread use of smartphones is boosting the market take-up of dedicated applications and among them, barcode scanning applications. Several barcodes scanners are available but show security and privacy weaknesses. In this paper, we provide a comprehensive security and privacy analysis of 100 barcode scanner applications. According to our analysis, there are some apps that provide security services including checking URLs and adopting cryptographic solutions, and other apps that guarantee user privacy by … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
39
0
2

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 39 publications
(41 citation statements)
references
References 14 publications
0
39
0
2
Order By: Relevance
“…Featuring automatic generation and scanning, they increase the processes reliability especially on the human interaction part. Also, in the COVID 19 pandemic QR codes became the main method touchless interaction especially in hospitals [62] , [63] .…”
Section: Blockchain and Smart Contractsmentioning
confidence: 99%
“…Featuring automatic generation and scanning, they increase the processes reliability especially on the human interaction part. Also, in the COVID 19 pandemic QR codes became the main method touchless interaction especially in hospitals [62] , [63] .…”
Section: Blockchain and Smart Contractsmentioning
confidence: 99%
“…Fiducial markers deployed in everyday environments are likely to suffer attacks similar to those targeting QR-codes [87]. The situation is worsened by the facts that fiducial markers have a limited dictionary space and that there is no place in the marker pattern for error correction codes, integrity check-sums, or other security guarantees that are typically used in the more information-capable QR-codes [88]. Considering only the marker pattern, it should thus be rather easy to change one message into another without discovery.…”
Section: Reliability and Security Issues With Csr Fiducialsmentioning
confidence: 99%
“…Public key cryptography (asymmetric) is a cryptographic system with two keys; public and private. This method is widely used in data encryption and authentication [23]. At the same time, Hash Function takes a message as input and returns a fixed-size value called "hash."…”
Section: Lightweight Cryptographic Smssmentioning
confidence: 99%
“…Digital Signature is a security scheme that employs public-key cryptography to validate authentication, integrity, and non-repudiation of a message, it computes the hash and then signs it by the private key [23].…”
Section: Lightweight Cryptographic Smssmentioning
confidence: 99%