Loading...
Please wait, while we are loading the content...
Similar Documents
Qr code security.
| Content Provider | CiteSeerX |
|---|---|
| Author | Kieseberg, Peter Leithner, Manuel Mulazzani, Martin Munroe, Lindsay Sinha, Mayank |
| Abstract | This paper examines QR Codes and how they can be used to attack both human interaction and automated systems. As the encoded information is intended to be machine readable only, a human cannot distinguish between a valid and a maliciously manipulated QR code. While humans might fall for phishing attacks, automated readers are most likely vulnerable to SQL injections and command injections. Our contribution consists of an analysis of the QR Code as an attack vector, showing different attack strategies from the attackers point of view and exploring their possible consequences. 1. |
| File Format | |
| Access Restriction | Open |
| Subject Keyword | Qr Code Security Qr Code Attacker Point Attack Vector Possible Consequence Command Injection Sql Injection Encoded Information Automated System Different Attack Strategy Human Interaction Human Cannot Distinguish |
| Content Type | Text |
| Resource Type | Article |