A survey of the QR code phishing: the current attacks and countermeasures

被引:0
|
作者
Yong, Kelvin S. C. [1 ]
Chiew, Kang Leng [2 ]
Tan, Choon Lin [2 ]
机构
[1] Curtin Univ Malaysia, Fac Engn & Sci, Sarawak, Malaysia
[2] Univ Malaysia Sarawak, Fac Comp Sci & Informat Technol, Sarawak, Malaysia
关键词
phishing techniques; QR code; anti-phishing techniques; digital signature; encryption; user education;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Quick response (QR) code gained popularity and has been adapted for various applications such as a pointer to digital information and authentication. While the code gives convenience as a physical pointer to the digital world, it can be manipulated to divert the intended destination of the link to a malicious site. Thus, QR codes can be easily exploited by phishers to launch phishing attacks. Here, the current phishing attacks that utilise the QR code as a vector are surveyed and categorised. The recent countermeasures for such attacks are surveyed as well. It is also found that, current countermeasures are insufficient and face challenges like barcode-in-barcode attacks, high overhead solutions and limited data space in the code. In comparison to the amount of work done in web and email phishing detection, QR code phishing detection still inadequate. This paper hopes to shed light on the recent phishing attacks using QR code and the countermeasures proposed to tackle these attacks.
引用
收藏
页码:255 / 259
页数:5
相关论文
共 50 条
  • [21] A Survey on Voice Assistant Security: Attacks and Countermeasures
    Yan, Chen
    Ji, Xiaoyu
    Wang, Kai
    Jiang, Qinhong
    Jin, Zizhi
    Xu, Wenyuan
    ACM COMPUTING SURVEYS, 2023, 55 (04)
  • [22] A survey on the detection of SQL injection attacks and their countermeasures
    Nagpal B.
    Chauhan N.
    Singh N.
    Journal of Information Processing Systems, 2017, 13 (04): : 689 - 702
  • [23] Phishing with Malicious QR Codes
    Sharevski, Filipo
    Devine, Amy
    Pieroni, Emma
    Jachim, Peter
    2022 EUROPEAN SYMPOSIUM ON USABLE SECURITY, EUROUSEC 2022, 2022, : 160 - 171
  • [24] JTAG Security Threats: Current Attacks and Countermeasures
    Wang S.
    Kameyama S.
    Takahashi H.
    Wang, Senling (wang@cs.ehime-u.ac.jp), 1600, Japan Institute of Electronics Packaging (24): : 668 - 674
  • [25] Realization and countermeasures for current location spoofing attacks
    Suzuki, Nobuo
    Harada, Taiga
    Fujihata, Takuya
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KSE 2021), 2021, 192 : 2115 - 2121
  • [26] Feature Selections for the Classification of Webpages to Detect Phishing Attacks: A Survey
    Korkmaz, Mehmet
    Sahingoz, Ozgur Koray
    Diri, Banu
    2ND INTERNATIONAL CONGRESS ON HUMAN-COMPUTER INTERACTION, OPTIMIZATION AND ROBOTIC APPLICATIONS (HORA 2020), 2020, : 365 - 373
  • [27] Malicious code on Java']Java Card smartcards: Attacks and countermeasures
    Mostowski, Wojciech
    Poll, Erik
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, PROCEEDINGS, 2008, 5189 : 1 - 16
  • [28] Attacks on Self-Driving Cars and Their Countermeasures: A Survey
    Chowdhury, Abdullahi
    Karmakar, Gour
    Kamruzzaman, Joarder
    Jolfaei, Alireza
    Das, Rajkumar
    IEEE ACCESS, 2020, 8 : 207308 - 207342
  • [29] Security in wireless sensor networks: a survey of attacks and countermeasures
    Martins, David
    Guyennet, Herve
    INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2011, 1 (1-3) : 151 - 162
  • [30] Classification of Security Attacks in WSNs and Possible Countermeasures: A Survey
    Sharma, Shivani
    Yadav, Anjulata
    Panchal, Manish
    Vyavahare, Prakash D.
    13TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATION SYSTEMS (IEEE ANTS), 2019,