{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T12:09:49Z","timestamp":1777723789445,"version":"3.51.4"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319076195","type":"print"},{"value":"9783319076201","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07620-1_8","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T12:55:03Z","timestamp":1402404903000},"page":"79-90","source":"Crossref","is-referenced-by-count":83,"title":["QR Code Security: A Survey of Attacks and Challenges for Usable Security"],"prefix":"10.1007","author":[{"given":"Katharina","family":"Krombholz","sequence":"first","affiliation":[]},{"given":"Peter","family":"Fr\u00fchwirt","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Kieseberg","sequence":"additional","affiliation":[]},{"given":"Ioannis","family":"Kapsalis","sequence":"additional","affiliation":[]},{"given":"Markus","family":"Huber","sequence":"additional","affiliation":[]},{"given":"Edgar","family":"Weippl","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"The WebKit Open Source Project (2013), \n                    \n                      http:\/\/www.webkit.org\n                    \n                    \n                   (last accessed on July 2, 2014)"},{"key":"8_CR2","unstructured":"Agusta, G.M., Hulliyah, K., Bahaweres, R.B., et al.: Qr code augmented reality tracking with merging on conventional marker based backpropagation neural network. In: 2012 International Conference on Advanced Computer Science and Information Systems (ICACSIS), pp. 245\u2013248. IEEE (2012)"},{"key":"8_CR3","unstructured":"Akhawe, D., Felt, A.P.: Alice in Warningland: A Large-scale Field Study of Browser Security Warning Effectiveness. In: Proceedings of the 22Nd USENIX Conference on Security (SEC 2013), pp. 257\u2013272 (2013)"},{"issue":"5","key":"8_CR4","first-page":"313","volume":"20","author":"S. Bellman","year":"2004","unstructured":"Bellman, S., Johnson, E.J., Kobrin, S.J., Lohse, G.L.: International differences in information privacy concerns: A global survey of consumers\u00a020(5), 313\u2013324 (2004)","journal-title":"International differences in information privacy concerns: A global survey of consumers"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Biddle, R., van Oorschot, P.C., Patrick, A.S., Sobey, J., Whalen, T.: Browser interfaces and extended validation ssl certificates: an empirical study. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, pp. 19\u201330. ACM (2009)","DOI":"10.1145\/1655008.1655012"},{"key":"8_CR6","unstructured":"Borgaonkar, R.: Dirty use of ussd codes in cellular network (2012), \n                    \n                      http:\/\/www.youtube.com\/watch?v=Q2-0B04HPhs\n                    \n                    \n                   (last accessed on July 2, 2014)"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Dow, C., Lee, Y., Yang, H., Koo, W., Liao, J.: A location-based mobile advertisement publishing system for vendors. In: Eighth International Conference on Information Technology: New Generations, pp. 24\u201329 (2011)","DOI":"10.1109\/ITNG.2011.12"},{"key":"8_CR8","first-page":"11","volume-title":"Proceedings of the 2Nd USENIX Conference on Web Application Development (WebApps 2011)","author":"H. Choi","year":"2011","unstructured":"Choi, H., Zhu, B.B., Lee, H.: Detecting Malicious Web Links and Identifying Their Attack Types. In: Proceedings of the 2Nd USENIX Conference on Web Application Development (WebApps 2011), p. 11. USENIX Association, Berkeley (2011)"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Lorenzi, D.: B Shafiq, J. Vaidya, G. Nabi, S. Chun, V. Atluri. Using QR codes for enhancing the scope of digital government services. In: Proceedings of the 13th Annual International Conference on Digital Government Research, pp. 21\u201329 (2012)","DOI":"10.1145\/2307729.2307734"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Pirrone, D., Andolina, S., Santangelo, A., Gentile, A., Takizava, M.: Platforms for human-human interaction in large social events. In: Seventh International Conference on Broadband, Wireless Computing, Communication and Applications, pp. 545\u2013551 (2012)","DOI":"10.1109\/BWCCA.2012.96"},{"key":"8_CR11","unstructured":"Moth, D.: PayPal trials QR code shop in Singapore subway (2012), \n                    \n                      http:\/\/econsultancy.com\/at\/blog\/8983-paypal-trials-qr-code-shop-in-singapore-subway\n                    \n                    \n                   (last accessed on July 2, 2014)"},{"key":"8_CR12","unstructured":"DENSO Wave Incorporated. What is a QR Code (2013), \n                    \n                      http:\/\/www.qrcode.com\/en\/\n                    \n                    \n                   (last accessed on July 2, 2014)"},{"key":"8_CR13","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1145\/1299015.1299019","volume-title":"Proceedings of the Anti-Phishing Working Groups 2Nd Annual eCrime Researchers Summit (eCrime 2007)","author":"J.S. Downs","year":"2007","unstructured":"Downs, J.S., Holbrook, M., Cranor, L.F.: Behavioral Response to Phishing Risk. In: Proceedings of the Anti-Phishing Working Groups 2Nd Annual eCrime Researchers Summit (eCrime 2007), pp. 37\u201344. ACM, New York (2007)"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Egelman, S., Cranor, L.F., Hong, J.: You\u2019Ve Been Warned: An Empirical Study of the Effectiveness of Web Browser Phishing Warnings. In: Proceedings of the 2008 SIGCHI Conference on Human Factors in Computing Systems (CHI 2008), pp. 1065\u20131074 (2008)","DOI":"10.1145\/1357054.1357219"},{"key":"8_CR15","unstructured":"Esponce. Innovative QR Code campaigns (About QR codes) (2013), \n                    \n                      http:\/\/www.esponce.com\/about-qr-codes\n                    \n                    \n                   (last accessed on July 2, 2014)"},{"key":"8_CR16","unstructured":"Esponce. Innovative, Q.R.: Esponce. Innovative QR Code campaigns (Real world case studies) (2013), \n                    \n                      http:\/\/www.esponce.com\/case-studies\n                    \n                    \n                   (last accessed on July 2, 2014)"},{"key":"8_CR17","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1145\/2484313.2484324","volume-title":"Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIA CCS 2013)","author":"C. Hanser","year":"2013","unstructured":"Hanser, C., Slamanig, D.: Blank digital signatures. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIA CCS 2013), pp. 95\u2013106. ACM, New York (2013)"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Harbach, M., Fahl, S., Muders, T., Smith, M.: Towards measuring warning readability. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 989\u2013991. ACM (2012)","DOI":"10.1145\/2382196.2382301"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Reed, I., Solomon, G.: Polynomial Codes Over Certain Finite Fields 8(2):300\u2013304 (1960)","DOI":"10.1137\/0108018"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Gao, J., Kulkarni, V., Ranavat, H.: Lee Chang Hsing Mei. A 2D barcode-based mobile payment system. In: Third International Conference on Multimedia and Ubiquitous Engineering, pp. 320\u2013329 (2009)","DOI":"10.1109\/MUE.2009.62"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Wang, J., Shyi, C., Hou, T.-W., Fong, C.P.: Design and implementation of augmented reality system collaborating with QR code. In: International Computer Symposium (ICS), pp. 414\u2013418 (2010)","DOI":"10.1109\/COMPSYM.2010.5685477"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Kieseberg, P., Leithner, M., Mulazzani, M., Munroe, L., Schrittwieser, S., Sinha, M., Weippl, E.: Qr code security. In: Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia, pp. 430\u2013435. ACM (2010)","DOI":"10.1145\/1971519.1971593"},{"key":"8_CR23","unstructured":"Korkidis, J.: The world\u2019s first qr-code hair cut (2014), \n                    \n                      http:\/\/www.complex.com\/art-design\/2011\/11\/the-worlds-first-qr-code-hair-cut\n                    \n                    \n                   (last accessed February 4, 2014)"},{"key":"8_CR24","unstructured":"Leyden, J.: That square QR barcode on the poster? Check it\u2019s not a sticker"},{"issue":"2","key":"8_CR25","first-page":"4","volume":"9","author":"M. Ebling","year":"2010","unstructured":"Ebling, M., Caceres, R.: Bar Codes Everywhere You Look\u00a09(2), 4\u20135 (2010)","journal-title":"Bar Codes Everywhere You Look"},{"key":"8_CR26","unstructured":"Talbot, M.: QR Codes: Scanning For Loyalty And Payment (2013), \n                    \n                      http:\/\/blogs.sap.com\/innovation\/industries\/qr-codes-scanning-for-loyalty-and-payment-3-025064\n                    \n                    \n                   (last accessed on July 2, 2014)"},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"Kieseberg, P., Leithner, M., Mulazzani, M., Munroe, L., Schrittwieser, S., Sinha, M., Weippl, E.: Qr code security. In: Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2010), pp. 430\u2013435 (2010)","DOI":"10.1145\/1971519.1971593"},{"key":"8_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1007\/978-3-642-14081-5_17","volume-title":"Information Security and Privacy","author":"K.G. Paterson","year":"2010","unstructured":"Paterson, K.G., Stebila, D.: One-time-password-authenticated key exchange. In: Steinfeld, R., Hawkes, P. (eds.) ACISP 2010. LNCS, vol.\u00a06168, pp. 264\u2013281. Springer, Heidelberg (2010)"},{"key":"8_CR29","unstructured":"Wagenseil, P.: Anti-Anonymous hacker threatens to expose them (2012), \n                    \n                      http:\/\/www.nbcnews.com\/id\/46716942\/ns\/technology_and_science-security\/\n                    \n                    \n                   (accessed July 2, 2014)"},{"key":"8_CR30","unstructured":"Pay, Q.: Qr pay - scan, pay, done (2014), \n                    \n                      http:\/\/www.qrpay.com\/\n                    \n                    \n                   (last accessed on July 2, 2014)"},{"key":"8_CR31","unstructured":"QRStuff. QR Code Error Correction (2011), \n                    \n                      http:\/\/www.qrstuff.com\/blog\/2011\/12\/14\/qr-code-error-correction\n                    \n                    \n                   (last accessed on July 2, 2014)"},{"key":"8_CR32","unstructured":"QRStuff. What\u2019s a QR Code (2011), \n                    \n                      http:\/\/www.qrstuff.com\/qr_codes.html\n                    \n                    \n                   (last accessed on July 2, 2014)"},{"key":"8_CR33","doi-asserted-by":"crossref","unstructured":"Rouillard, J., Laroussi, M.: Perzoovasive: contextual pervasive qr codes as tool to provide an adaptive learning support. In: Proceedings of the 5th International Conference on Soft Computing as Transdisciplinary Science and Technology, pp. 542\u2013548. ACM (2008)","DOI":"10.1145\/1456223.1456332"},{"key":"8_CR34","unstructured":"Russ Cox. QArt Codes (2012), \n                    \n                      http:\/\/research.swtch.com\/qart\n                    \n                    \n                   (last accessed on July 2, 2014)"},{"key":"8_CR35","doi-asserted-by":"crossref","unstructured":"Seeburger, J.: No cure for curiosity: linking physical and digital urban layers. In: Proceedings of the 7th Nordic Conference on Human-Computer Interaction: Making Sense Through Design, pp. 247\u2013256. ACM (2012)","DOI":"10.1145\/2399016.2399054"},{"key":"8_CR36","doi-asserted-by":"crossref","unstructured":"Sharma, V.: A study of malicious qr codes\u00a03(3) (May 2012)","DOI":"10.12968\/sece.2012.1.68"},{"key":"8_CR37","unstructured":"Steeman, J.: QR code data capacity (2004), \n                    \n                      http:\/\/blog.qr4.nl\/page\/QR-Code-Data-Capacity.aspx\n                    \n                    \n                   (last accessed on July 2, 2014)"},{"key":"8_CR38","unstructured":"Sunshine, J., Egelman, S., Almuhimedi, H., Atri, N., Cranor, L.F.: Crying wolf: An empirical study of ssl warning effectiveness, 399\u2013416 (2009)"},{"key":"8_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-642-14577-3_15","volume-title":"Financial Cryptography and Data Security","author":"T. Moore","year":"2010","unstructured":"Moore, T., Edelman, B.: Measuring the perpetrators and funders of typosquatting. In: Sion, R. (ed.) FC 2010. LNCS, vol.\u00a06052, pp. 175\u2013191. Springer, Heidelberg (2010)"},{"key":"8_CR40","unstructured":"Thonky.com. QR Code Tutorial (2012), \n                    \n                      http:\/\/www.thonky.com\/qr-code-tutorial\/\n                    \n                    \n                   (last accessed on July 2, 2014)"},{"key":"8_CR41","doi-asserted-by":"crossref","unstructured":"Ceipidor, U.B., Medaglia, C.M., Perrone, A., De Marsico, M., Di Romano, G.: A museum mobile game for children using QR-codes. In: Proceedings of the 8th International Conference on Interaction Design and Children, IDC 2009, pp. 282\u2013283 (2009)","DOI":"10.1145\/1551788.1551857"},{"key":"8_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/978-3-642-41320-9_4","volume-title":"Financial Cryptography and Data Security","author":"T. Vidas","year":"2013","unstructured":"Vidas, T., Owusu, E., Wang, S., Zeng, C., Cranor, L.F., Christin, N.: QRishing: The susceptibility of smartphone users to QR code phishing attacks. In: Adams, A.A., Brenner, M., Smith, M. (eds.) FC 2013. LNCS, vol.\u00a07862, pp. 52\u201369. Springer, Heidelberg (2013)"},{"key":"8_CR43","doi-asserted-by":"crossref","unstructured":"Vratonjic, N., Freudiger, J., Bindschaedler, V., Hubaux, J.-P.: The Inconvenient Truth about Web Certificates, pp. 79\u2013117 (2013)","DOI":"10.1007\/978-1-4614-1981-5_5"},{"key":"8_CR44","doi-asserted-by":"crossref","unstructured":"Kao, Y., Luo, G., Lin, H., Huang, Y., Yuani, S.: Physical access control based on QR code. In: International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, pp. 285\u2013288 (2011)","DOI":"10.1109\/CyberC.2011.55"},{"key":"8_CR45","doi-asserted-by":"crossref","unstructured":"Yao, H., Shin, D.: Towards preventing qr code based attacks on android phone using security warnings. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 341\u2013346. ACM (2013)","DOI":"10.1145\/2484313.2484357"},{"key":"8_CR46","unstructured":"Zhang, Y., Egelman, S., Cranor, L., Hong, J.: Phinding phish: Evaluating anti-phishing tools. In: Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS 2007) (2007)"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07620-1_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T23:13:45Z","timestamp":1582413225000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07620-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319076195","9783319076201"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07620-1_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}