Cracking the Code: A Study on Exploitable Weaknesses in QR Code Technology

[{“box”:0,”content”:”n[if 992 equals=”Open Access”]n

n

n

n

Open Access

nn

n

n[/if 992]n

n

Year : July 2, 2024 at 12:03 pm | [if 1553 equals=””] Volume :12 [else] Volume :12[/if 1553] | [if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] : 02 | Page : –

n

n

n

n

n

n

By

n

[foreach 286]n

n

n

Aiswarya Dwarampudi, Yamuna Mundru, Manas Kumar Yogi

n

    n t

  • n

n

n[/foreach]

n

n[if 2099 not_equal=”Yes”]n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Assistant Professor, Assistant Professor, Assistant Professor CSE Department, Pragati Engineering College, Near Kakinada, Kakinada District, CSE –AI & ML Department, Pragati Engineering College, Near Kakinada, Kakinada District, CSE Department, Pragati Engineering College, Near Kakinada, Kakinada District Andhra Pradesh, Andhra Pradesh, Andhra Pradesh India, India, India
  2. n[/if 1175][/foreach]

n[/if 2099][if 2099 equals=”Yes”][/if 2099]n

n

Abstract

nThis study investigates the exploitable weaknesses inherent in QR code technology, aiming to provide insights into potential security risks and mitigation strategies. QR codes, ubiquitous in modern society, serve various purposes ranging from marketing to authentication. However, their widespread utilization also renders them vulnerable to exploits by malicious actors. The research identifies common vulnerabilities such as data tampering, code injection, and phishing attacks, which can have significant consequences including financial losses, data breaches, and privacy violations. To address these vulnerabilities, the study proposes a multifaceted approach encompassing authentication mechanisms, secure QR code generation practices, and user awareness programs. Furthermore, emphasizing compliance with industry standards and regulations is highlighted as a crucial aspect of QR code security. Through a comprehensive analysis of QR code weaknesses and their implications, this study underscores the importance of proactively addressing security risks to maintain trust and integrity in digital transactions involving QR codes. By enhancing QR code security measures and fostering collaboration among stakeholders, organizations and individuals can mitigate risks and ensure the reliability of QR code-based interactions in an increasingly interconnected digital landscape.

n

n

n

Keywords: QR Code, pattern, security, data protection, encoding, decoding

n[if 424 equals=”Regular Issue”][This article belongs to Journal Of Network security(jons)]

n

[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in Journal Of Network security(jons)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

n

n

n

How to cite this article: Aiswarya Dwarampudi, Yamuna Mundru, Manas Kumar Yogi. Cracking the Code: A Study on Exploitable Weaknesses in QR Code Technology. Journal Of Network security. July 2, 2024; 12(02):-.

n

How to cite this URL: Aiswarya Dwarampudi, Yamuna Mundru, Manas Kumar Yogi. Cracking the Code: A Study on Exploitable Weaknesses in QR Code Technology. Journal Of Network security. July 2, 2024; 12(02):-. Available from: https://journals.stmjournals.com/jons/article=July 2, 2024/view=0

nn[if 992 equals=”Open Access”] Full Text PDF Download[/if 992] n

n[if 992 not_equal=’Open Access’] [/if 992]nn

nn[if 379 not_equal=””]n

Browse Figures

n

n

[foreach 379]n

n[/foreach]n

n

n

n[/if 379]n

n

References

n[if 1104 equals=””]n

  1. Dabrowski A, Krombholz K, Ullrich J, Weippl ER. QR inception: Barcode-in-barcode attacks. InProceedings of the 4th ACM workshop on security and privacy in smartphones & mobile devices 2014 Nov 7 (pp. 3–10).
  2. Han X, Zhang Y, Zhang X, Chen Z, Wang M, Zhang Y, Ma S, Yu Y, Bertino E, Li J. Medusa Attack: Exploring Security Hazards of {In-App}{QR} Code Scanning. In32nd USENIX Security Symposium (USENIX Security 23) 2023 (pp. 4607–4624).
  3. Tribak H, Gaou M, Gaou S, Zaz Y. QR code recognition based on HOG and multiclass SVM classifier. Multimedia Tools and Applications. 2023 Nov 13:1–30.
  4. Lin D, Stamp M. Hunting for undetectable metamorphic viruses. Journal in computer virology. 2011 Aug;7:201–14.
  5. Mannan M, Barrera D, Brown CD, Lie D, Van Oorschot PC. Mercury: Recovering forgotten passwords using personal devices. In Financial Cryptography and Data Security: 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28-March 4, 2011, Revised Selected Papers 15 2012 (pp. 315–330). Springer Berlin Heidelberg.
  6. Kals S, Kirda E, Kruegel C, Jovanovic N. Secubat: a web vulnerability scanner. InProceedings of the 15th international conference on World Wide Web 2006 May 23 (pp. 247–256).
  7. Ali H, Kharade KG, Kamat RK. An analysis and evaluation of vulnerability assessment tools. Cyberpsychol Behav Soc Netw. 2022;25(4):448–56.
  8. Vuagnoux M, Pasini S. An improved technique to discover compromising electromagnetic emanations. In2010 IEEE International Symposium on Electromagnetic Compatibility 2010 Jul 25 (pp. 121–126). IEEE.
  9. Elbaz L, Bar-El H. Discretix Technologies Ltd. Using PKC in Mobile Phones, White Paper. 2000 Oct.
  10. Viega J, Bloch JT, Kohno T, McGraw G. Token-based scanning of source code for security problems. ACM Transactions on Information and System Security (TISSEC). 2002 Aug 1;5(3):238–61.
  11. Phillips SK. Creating feedback channels with optical communications for Information Operations (IO) (Doctoral dissertation, Monterey, California: Naval Postgraduate School). https://core.ac.uk/download/pdf/45464713.pdf
  12. Blaze M. Election integrity and technology: vulnerabilities and solutions. Geo. L. Tech. Rev.. 2019;4:505.
  13. Black PE, Kass M, Koo M, Fong E. Source code security analysis tool functional specification version 1.0. US Department of Commerce, National Institute of Standards and Technology; 2007 May 1.
  14. Bletsch T, Jiang X, Freeh V. Mitigating code-reuse attacks with control-flow locking. InProceedings of the 27th Annual Computer Security Applications Conference 2011 Dec 5 (pp. 353–362).

nn[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

nn


nn[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=””]Regular Issue[else]Published[/if 424] Subscription Review Article

n

n

n

n

n

Journal Of Network security

n

[if 344 not_equal=””]ISSN: 2395-6739[/if 344]

n

n

n

n

n

[if 2146 equals=”Yes”][/if 2146][if 2146 not_equal=”Yes”][/if 2146]n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n[if 1748 not_equal=””]

[else]

[/if 1748]n

n

n

Volume 12
[if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] 02
Received February 29, 2024
Accepted April 25, 2024
Published July 2, 2024

n

n

n

n

n

n function myFunction2() {n var x = document.getElementById(“browsefigure”);n if (x.style.display === “block”) {n x.style.display = “none”;n }n else { x.style.display = “Block”; }n }n document.querySelector(“.prevBtn”).addEventListener(“click”, () => {n changeSlides(-1);n });n document.querySelector(“.nextBtn”).addEventListener(“click”, () => {n changeSlides(1);n });n var slideIndex = 1;n showSlides(slideIndex);n function changeSlides(n) {n showSlides((slideIndex += n));n }n function currentSlide(n) {n showSlides((slideIndex = n));n }n function showSlides(n) {n var i;n var slides = document.getElementsByClassName(“Slide”);n var dots = document.getElementsByClassName(“Navdot”);n if (n > slides.length) { slideIndex = 1; }n if (n (item.style.display = “none”));n Array.from(dots).forEach(n item => (item.className = item.className.replace(” selected”, “”))n );n slides[slideIndex – 1].style.display = “block”;n dots[slideIndex – 1].className += ” selected”;n }nn”}]