A survey of the QR code phishing: the current attacks and countermeasures

被引:0
|
作者
Yong, Kelvin S. C. [1 ]
Chiew, Kang Leng [2 ]
Tan, Choon Lin [2 ]
机构
[1] Curtin Univ Malaysia, Fac Engn & Sci, Sarawak, Malaysia
[2] Univ Malaysia Sarawak, Fac Comp Sci & Informat Technol, Sarawak, Malaysia
关键词
phishing techniques; QR code; anti-phishing techniques; digital signature; encryption; user education;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Quick response (QR) code gained popularity and has been adapted for various applications such as a pointer to digital information and authentication. While the code gives convenience as a physical pointer to the digital world, it can be manipulated to divert the intended destination of the link to a malicious site. Thus, QR codes can be easily exploited by phishers to launch phishing attacks. Here, the current phishing attacks that utilise the QR code as a vector are surveyed and categorised. The recent countermeasures for such attacks are surveyed as well. It is also found that, current countermeasures are insufficient and face challenges like barcode-in-barcode attacks, high overhead solutions and limited data space in the code. In comparison to the amount of work done in web and email phishing detection, QR code phishing detection still inadequate. This paper hopes to shed light on the recent phishing attacks using QR code and the countermeasures proposed to tackle these attacks.
引用
收藏
页码:255 / 259
页数:5
相关论文
共 50 条
  • [41] Backdoor Attacks to Deep Learning Models and Countermeasures: A Survey
    Li, Yudong
    Zhang, Shigeng
    Wang, Weiping
    Song, Hong
    IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2023, 4 : 134 - 146
  • [42] Cyber Threats to Industrial IoT: A Survey on Attacks and Countermeasures
    Tsiknas, Konstantinos
    Taketzis, Dimitrios
    Demertzis, Konstantinos
    Skianis, Charalabos
    IOT, 2021, 2 (01): : 163 - 186
  • [43] Detection of phishing attacks
    Baykara, Muhammet
    Gurel, Zahit Ziya
    2018 6TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2018, : 399 - 403
  • [44] Android Malware Attacks and Countermeasures: Current and Future Directions
    Raveendranath, Rahul
    Rajamani, Venkiteswaran
    Babu, Anoop Joseph
    Datta, Soumya Kanti
    2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2014, : 137 - 143
  • [45] The State of Phishing Attacks
    Hong, Jason
    COMMUNICATIONS OF THE ACM, 2012, 55 (01) : 74 - 81
  • [46] Phishing Attacks and Defenses
    Chaudhry, Junaid Ahsenali
    Chaudhry, Shafique Ahmad
    Rittenhouse, Robert G.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (01): : 247 - 256
  • [47] A comprehensive survey of AI-enabled phishing attacks detection techniques
    Basit, Abdul
    Zafar, Maham
    Liu, Xuan
    Javed, Abdul Rehman
    Jalil, Zunera
    Kifayat, Kashif
    TELECOMMUNICATION SYSTEMS, 2021, 76 (01) : 139 - 154
  • [48] A Survey of Intelligent Detection Designs of HTML']HTML URL Phishing Attacks
    Asiri, Sultan
    Xiao, Yang
    Alzahrani, Saleh
    Li, Shuhui
    Li, Tieshan
    IEEE ACCESS, 2023, 11 : 6421 - 6443
  • [49] A comprehensive survey of AI-enabled phishing attacks detection techniques
    Abdul Basit
    Maham Zafar
    Xuan Liu
    Abdul Rehman Javed
    Zunera Jalil
    Kashif Kifayat
    Telecommunication Systems, 2021, 76 : 139 - 154
  • [50] Phishing and Countermeasures in Spanish Online Banking
    Uusitalo, Ilkka
    Catot, Josep M.
    Loureiro, Ramon
    2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 167 - +