A survey of the QR code phishing: the current attacks and countermeasures

被引:0
|
作者
Yong, Kelvin S. C. [1 ]
Chiew, Kang Leng [2 ]
Tan, Choon Lin [2 ]
机构
[1] Curtin Univ Malaysia, Fac Engn & Sci, Sarawak, Malaysia
[2] Univ Malaysia Sarawak, Fac Comp Sci & Informat Technol, Sarawak, Malaysia
关键词
phishing techniques; QR code; anti-phishing techniques; digital signature; encryption; user education;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Quick response (QR) code gained popularity and has been adapted for various applications such as a pointer to digital information and authentication. While the code gives convenience as a physical pointer to the digital world, it can be manipulated to divert the intended destination of the link to a malicious site. Thus, QR codes can be easily exploited by phishers to launch phishing attacks. Here, the current phishing attacks that utilise the QR code as a vector are surveyed and categorised. The recent countermeasures for such attacks are surveyed as well. It is also found that, current countermeasures are insufficient and face challenges like barcode-in-barcode attacks, high overhead solutions and limited data space in the code. In comparison to the amount of work done in web and email phishing detection, QR code phishing detection still inadequate. This paper hopes to shed light on the recent phishing attacks using QR code and the countermeasures proposed to tackle these attacks.
引用
收藏
页码:255 / 259
页数:5
相关论文
共 50 条
  • [31] A Survey of Network-on-Chip Security Attacks and Countermeasures
    Charles, Subodha
    Mishra, Prabhat
    ACM COMPUTING SURVEYS, 2021, 54 (05)
  • [32] A Survey of Attacks on Controller Area Networks and Corresponding Countermeasures
    Jo, Hyo Jin
    Choi, Wonsuk
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (07) : 6123 - 6141
  • [33] A survey of microarchitectural timing attacks and countermeasures on contemporary hardware
    Qian Ge
    Yuval Yarom
    David Cock
    Gernot Heiser
    Journal of Cryptographic Engineering, 2018, 8 : 1 - 27
  • [34] Attacks and countermeasures on blockchains: A survey from layering perspective
    Wen, Yujuan
    Lu, Fengyuan
    Liu, Yufei
    Huang, Xinli
    COMPUTER NETWORKS, 2021, 191
  • [35] A Survey of Side-Channel Attacks on Caches and Countermeasures
    Yangdi Lyu
    Prabhat Mishra
    Journal of Hardware and Systems Security, 2018, 2 (1) : 33 - 50
  • [36] A Comprehensive Survey on Poisoning Attacks and Countermeasures in Machine Learning
    Tian, Zhiyi
    Cui, Lei
    Liang, Jie
    Yu, Shui
    ACM COMPUTING SURVEYS, 2023, 55 (08)
  • [37] A Survey on Online Banking System Attacks and its Countermeasures
    Kaur, Navjeet
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (03): : 57 - 61
  • [38] Manipulating Recommender Systems: A Survey of Poisoning Attacks and Countermeasures
    Nguyen, Thanh Toan
    Hung, Nguyen Quoc Viet
    Nguyen, Thanh Tam
    Huynh, Thanh Trung
    Nguyen, Thanh Thi
    Weidlich, Matthias
    Yin, Hongzhi
    ACM COMPUTING SURVEYS, 2025, 57 (01)
  • [39] A Survey on Security of UAV Swarm Networks: Attacks and Countermeasures
    Wang, Xiaojie
    Zhao, Zhonghui
    Yi, Ling
    Ning, Zhaolong
    Guo, Lei
    Yu, F. richard
    Guo, Song
    ACM COMPUTING SURVEYS, 2025, 57 (03)
  • [40] A survey of microarchitectural timing attacks and countermeasures on contemporary hardware
    Ge, Qian
    Yarom, Yuval
    Cock, David
    Heiser, Gernot
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2018, 8 (01) : 1 - 27