{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:40:42Z","timestamp":1776102042800,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,7]],"date-time":"2014-11-07T00:00:00Z","timestamp":1415318400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004955","name":"\u00d6sterreichische Forschungsf\u00f6rderungsgesellschaft","doi-asserted-by":"publisher","award":["COMET K1"],"award-info":[{"award-number":["COMET K1"]}],"id":[{"id":"10.13039\/501100004955","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004955","name":"\u00d6sterreichische Forschungsf\u00f6rderungsgesellschaft","doi-asserted-by":"publisher","award":["Josef Ressel Center: u'smile"],"award-info":[{"award-number":["Josef Ressel Center: u'smile"]}],"id":[{"id":"10.13039\/501100004955","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002428","name":"Austrian Science Fund","doi-asserted-by":"publisher","award":["P 26289-N23"],"award-info":[{"award-number":["P 26289-N23"]}],"id":[{"id":"10.13039\/501100002428","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,7]]},"DOI":"10.1145\/2666620.2666624","type":"proceedings-article","created":{"date-parts":[[2014,11,7]],"date-time":"2014-11-07T17:10:54Z","timestamp":1415380254000},"page":"3-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["QR Inception"],"prefix":"10.1145","author":[{"given":"Adrian","family":"Dabrowski","sequence":"first","affiliation":[{"name":"SBA Research, Vienna, Austria"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Katharina","family":"Krombholz","sequence":"additional","affiliation":[{"name":"SBA Research, Vienna, Austria"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Johanna","family":"Ullrich","sequence":"additional","affiliation":[{"name":"SBA Research, Vienna, Austria"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Edgar R.","family":"Weippl","sequence":"additional","affiliation":[{"name":"SBA Research, Vienna, Austria"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2014,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"ISO\/IEC 16022: Information technology -- Automatic identification and data capture techniques -- Data Matrix bar code symbology specification.  ISO\/IEC 16022: Information technology -- Automatic identification and data capture techniques -- Data Matrix bar code symbology specification."},{"key":"e_1_3_2_1_2_1","unstructured":"ISO\/IEC 18004: Information technology -- Automatic identification and data capture techniques -- QR Code 2005 bar code symbology specification.  ISO\/IEC 18004: Information technology -- Automatic identification and data capture techniques -- QR Code 2005 bar code symbology specification."},{"key":"e_1_3_2_1_3_1","volume-title":"https:\/\/github.com\/zxing\/zxing, accessed July 18th","year":"2014","unstructured":"Official ZXing (\"Zebra Crossing\") project home. https:\/\/github.com\/zxing\/zxing, accessed July 18th 2014 . Official ZXing (\"Zebra Crossing\") project home. https:\/\/github.com\/zxing\/zxing, accessed July 18th 2014."},{"key":"e_1_3_2_1_4_1","unstructured":"3GVision. i-nigma. Apple App Store. https:\/\/itunes.apple.com\/en\/app\/id388923203.  3GVision. i-nigma. Apple App Store. https:\/\/itunes.apple.com\/en\/app\/id388923203."},{"key":"e_1_3_2_1_5_1","unstructured":"3GVision. i-nigma Barcode Scanner. Google Play Store. https:\/\/play.google.com\/store\/apps\/details?id=com.threegvision.products.inigma.Android.  3GVision. i-nigma Barcode Scanner. Google Play Store. https:\/\/play.google.com\/store\/apps\/details?id=com.threegvision.products.inigma.Android."},{"key":"e_1_3_2_1_6_1","unstructured":"A. Albertini. corkami: Reverse engineering and visual documentations. http:\/\/code.google.com\/p\/corkami\/#Binary_files accessed September 6th 2014.  A. Albertini. corkami: Reverse engineering and visual documentations. http:\/\/code.google.com\/p\/corkami\/#Binary_files accessed September 6th 2014."},{"key":"e_1_3_2_1_7_1","volume-title":"This PDF is a JPEG","author":"Albertini A.","year":"2014","unstructured":"A. Albertini . This PDF is a JPEG ; or, This Proof of Concept is a Picture of Cats. In PoC jj GTFO 0x03. March 2014 . http:\/\/corkami.googlecode.com\/svn\/trunk\/doc\/pocorgtfo\/pocorgtfo03.pdf. A. Albertini. This PDF is a JPEG; or, This Proof of Concept is a Picture of Cats. In PoC jj GTFO 0x03. March 2014. http:\/\/corkami.googlecode.com\/svn\/trunk\/doc\/pocorgtfo\/pocorgtfo03.pdf."},{"key":"e_1_3_2_1_8_1","volume-title":"The death of AV defense in depth - revisiting anti-virus software","author":"Alvarez S.","year":"2008","unstructured":"S. Alvarez and T. Zoller . The death of AV defense in depth - revisiting anti-virus software , 2008 . http:\/\/cansecwest.com\/csw08\/csw08-alvarez.pdf. S. Alvarez and T. Zoller. The death of AV defense in depth - revisiting anti-virus software, 2008. http:\/\/cansecwest.com\/csw08\/csw08-alvarez.pdf."},{"key":"e_1_3_2_1_9_1","unstructured":"AT&T Services Inc. AT&T Code Scanner: QR UPC & DM. Google Play Store. https:\/\/play.google.com\/store\/apps\/details?id=com.mtag.att.codescanner.  AT&T Services Inc. AT&T Code Scanner: QR UPC & DM. Google Play Store. https:\/\/play.google.com\/store\/apps\/details?id=com.mtag.att.codescanner."},{"key":"e_1_3_2_1_10_1","volume-title":"DeCarlo. AVG: QR code-based malware attacks to rise","author":"M.","year":"2012","unstructured":"M. DeCarlo. AVG: QR code-based malware attacks to rise in 2012 , 2012. http: \/\/www.techspot.com\/news\/47189-avg-qr-code.html, accessed July 18th 2014. M. DeCarlo. AVG: QR code-based malware attacks to rise in 2012, 2012. http: \/\/www.techspot.com\/news\/47189-avg-qr-code.html, accessed July 18th 2014."},{"key":"e_1_3_2_1_11_1","unstructured":"DENSO WAVE. History of QR Code. http:\/\/www.qrcode.com\/en\/history\/ accessed July 13th 2014.  DENSO WAVE. History of QR Code. http:\/\/www.qrcode.com\/en\/history\/ accessed July 13th 2014."},{"key":"e_1_3_2_1_12_1","first-page":"54","volume-title":"Proceedings to WOOT 2011","author":"Goodspeed T.","year":"2011","unstructured":"T. Goodspeed , S. Bratus , R. Melgares , R. Shapiro , and R. Speers . Packets in packets: Orson welles' in-band signaling attacks for modern radios . In Proceedings to WOOT 2011 , pages 54 -- 61 , August 2011 . T. Goodspeed, S. Bratus, R. Melgares, R. Shapiro, and R. Speers. Packets in packets: Orson welles' in-band signaling attacks for modern radios. In Proceedings to WOOT 2011, pages 54--61, August 2011."},{"key":"e_1_3_2_1_13_1","volume-title":"Symbol DS6708 Digital Scanner Product Reference Guide","author":"M. Inc.","year":"2009","unstructured":"M. Inc. Symbol DS6708 Digital Scanner Product Reference Guide , 2009 . http:\/\/www.motorolasolutions.com\/web\/Business\/Products\/Bar%20Code%20Scanning\/Bar%20Code%20Scanners\/General%20Purpose%20Scanners\/_Documents\/static_file\/ds6708.pdf. M. Inc. Symbol DS6708 Digital Scanner Product Reference Guide, 2009. http:\/\/www.motorolasolutions.com\/web\/Business\/Products\/Bar%20Code%20Scanning\/Bar%20Code%20Scanners\/General%20Purpose%20Scanners\/_Documents\/static_file\/ds6708.pdf."},{"key":"e_1_3_2_1_14_1","unstructured":"ISO\/IEC 24778: Information technology -- Automatic identification and data capture techniques -- Aztec Code bar code symbology specification.  ISO\/IEC 24778: Information technology -- Automatic identification and data capture techniques -- Aztec Code bar code symbology specification."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.15"},{"key":"e_1_3_2_1_16_1","unstructured":"Kerem Erkan. Qrafter. Apple App Store. https:\/\/itunes.apple.com\/us\/app\/id416098700.  Kerem Erkan. Qrafter. Apple App Store. https:\/\/itunes.apple.com\/us\/app\/id416098700."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.103"},{"key":"e_1_3_2_1_18_1","series-title":"Atlantis Ambient and Pervasive Intelligence","doi-asserted-by":"crossref","first-page":"21","DOI":"10.2991\/978-94-91216-71-8_2","volume-title":"Trustworthy Ubiquitous Computing","author":"Kieseberg P.","year":"2012","unstructured":"P. Kieseberg , S. Schrittwieser , M. Leithner , M. Mulazzani , E. Weippl , L. Munroe , and M. Sinha . Malicious Pixels Using QR Codes as Attack Vector . In I. Khalil and T. Mantoro, editors, Trustworthy Ubiquitous Computing , volume 6 of Atlantis Ambient and Pervasive Intelligence , pages 21 -- 38 . Atlantis Press , 2012 . P. Kieseberg, S. Schrittwieser, M. Leithner, M. Mulazzani, E. Weippl, L. Munroe, and M. Sinha. Malicious Pixels Using QR Codes as Attack Vector. In I. Khalil and T. Mantoro, editors, Trustworthy Ubiquitous Computing, volume 6 of Atlantis Ambient and Pervasive Intelligence, pages 21--38. Atlantis Press, 2012."},{"key":"e_1_3_2_1_19_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1007\/978-3-319-07620-1_8","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"Krombholz K.","year":"2014","unstructured":"K. Krombholz , P. Fr\u00fchwirt , P. Kieseberg , I. Kapsalis , M. Huber , and E. Weippl . QR Code Security: A Survey of Attacks and Challenges for Usable Security . In T. Tryfonas and I. Askoxylakis, editors, Human Aspects of Information Security, Privacy, and Trust , volume 8533 of Lecture Notes in Computer Science , pages 79 -- 90 . Springer International Publishing , 2014 . K. Krombholz, P. Fr\u00fchwirt, P. Kieseberg, I. Kapsalis, M. Huber, and E. Weippl. QR Code Security: A Survey of Attacks and Challenges for Usable Security. In T. Tryfonas and I. Askoxylakis, editors, Human Aspects of Information Security, Privacy, and Trust, volume 8533 of Lecture Notes in Computer Science, pages 79--90. Springer International Publishing, 2014."},{"key":"e_1_3_2_1_20_1","volume-title":"QR Code: USSD attack","author":"Naik B.","year":"2012","unstructured":"B. Naik . QR Code: USSD attack , 2012 . http:\/\/resources.infosecinstitute.com\/qr-code-ussd-attack\/, accessed July 18th 2014. B. Naik. QR Code: USSD attack, 2012. http:\/\/resources.infosecinstitute.com\/qr-code-ussd-attack\/, accessed July 18th 2014."},{"key":"e_1_3_2_1_21_1","unstructured":"NeoMedia Technologies Inc. NeoReader. Apple App Store. https:\/\/itunes.apple.com\/us\/app\/id284973754.  NeoMedia Technologies Inc. NeoReader. Apple App Store. https:\/\/itunes.apple.com\/us\/app\/id284973754."},{"key":"e_1_3_2_1_22_1","unstructured":"NeoMedia Technologies Inc. NeoReader QR & Barcode Scanner. Google Play Store. https:\/\/play.google.com\/store\/apps\/details?id=de.gavitec.android.  NeoMedia Technologies Inc. NeoReader QR & Barcode Scanner. Google Play Store. https:\/\/play.google.com\/store\/apps\/details?id=de.gavitec.android."},{"key":"e_1_3_2_1_23_1","volume-title":"Security Overview of QR Codes","author":"Peng K.","year":"2014","unstructured":"K. Peng , H. Sanabria , D. Wu , and C. Zhu . Security Overview of QR Codes . 2014 . MIT Student Paper , available online https:\/\/courses.csail.mit.edu\/6.857\/2014\/files\/12-peng-sanabria-wu-zhu-qr-codes.pdf. K. Peng, H. Sanabria, D. Wu, and C. Zhu. Security Overview of QR Codes. 2014. MIT Student Paper, available online https:\/\/courses.csail.mit.edu\/6.857\/2014\/files\/12-peng-sanabria-wu-zhu-qr-codes.pdf."},{"issue":"3","key":"e_1_3_2_1_24_1","volume":"7","author":"Sassaman L.","year":"2013","unstructured":"L. Sassaman , M. L. Patterson , S. Bratus , M. E. Locasto , and A. Shubina . Security Applications of Formal Language Theory. In IEEE Systems Journal , Volume 7 , Issue 3 , Sept. 2013 . L. Sassaman, M. L. Patterson, S. Bratus, M. E. Locasto, and A. Shubina. Security Applications of Formal Language Theory. In IEEE Systems Journal, Volume 7, Issue 3, Sept. 2013.","journal-title":"Security Applications of Formal Language Theory. In IEEE Systems Journal"},{"key":"e_1_3_2_1_25_1","author":"Scanbuy Inc. ScanLife Barcode & QR Code Reader with Prices, Deals, &","unstructured":"Scanbuy Inc. ScanLife Barcode & QR Code Reader with Prices, Deals, & Reviews. Apple App Store. https:\/\/itunes.apple.com\/us\/app\/scanlife-barcode-reader-qr\/id285324287. Scanbuy Inc. ScanLife Barcode & QR Code Reader with Prices, Deals, & Reviews. Apple App Store. https:\/\/itunes.apple.com\/us\/app\/scanlife-barcode-reader-qr\/id285324287.","journal-title":"Reviews. Apple App Store. https:\/\/itunes.apple.com\/us\/app\/scanlife-barcode-reader-qr\/id285324287."},{"key":"e_1_3_2_1_26_1","unstructured":"Scanbuy Inc. ScanLife QR & Barcode Reader. Google Play Store. https:\/\/play.google.com\/store\/apps\/details?id=com.ScanLife.  Scanbuy Inc. ScanLife QR & Barcode Reader. Google Play Store. https:\/\/play.google.com\/store\/apps\/details?id=com.ScanLife."},{"key":"e_1_3_2_1_27_1","unstructured":"ShopSavvy Inc. QR Code Reader and Scanner. Apple App Store. https:\/\/itunes.apple.com\/en\/app\/qr-code-reader-and-scanner\/id388175979.  ShopSavvy Inc. QR Code Reader and Scanner. Apple App Store. https:\/\/itunes.apple.com\/en\/app\/qr-code-reader-and-scanner\/id388175979."},{"key":"e_1_3_2_1_28_1","unstructured":"ShopSavvy Inc. ShopSavvy Barcode Scanner. Google Play Store. https:\/\/play.google.com\/store\/apps\/details?id=com.biggu.shopsavvy.  ShopSavvy Inc. ShopSavvy Barcode Scanner. Google Play Store. https:\/\/play.google.com\/store\/apps\/details?id=com.biggu.shopsavvy."},{"key":"e_1_3_2_1_29_1","volume-title":"October","author":"Tam D.","year":"2013","unstructured":"D. Tam . PayPal offers QR codes for retail-store purchases , October 2013 . http:\/\/www.cnet.com\/news\/paypal-offers-qr-codes-for-retail-store-purchases\/,accessed July 24th 2014. D. Tam. PayPal offers QR codes for retail-store purchases, October 2013. http:\/\/www.cnet.com\/news\/paypal-offers-qr-codes-for-retail-store-purchases\/,accessed July 24th 2014."},{"key":"e_1_3_2_1_30_1","unstructured":"Ubercoders. UberScanner. Google Play Store. https:\/\/play.google.com\/store\/apps\/details?id=org.ubercoders.uberscanner.  Ubercoders. UberScanner. Google Play Store. https:\/\/play.google.com\/store\/apps\/details?id=org.ubercoders.uberscanner."},{"key":"e_1_3_2_1_31_1","unstructured":"ZXing Team. Barcode Scanner. Google Play Store. https:\/\/play.google.com\/store\/apps\/details?id=com.google.zxing.client.android.  ZXing Team. Barcode Scanner. Google Play Store. https:\/\/play.google.com\/store\/apps\/details?id=com.google.zxing.client.android."}],"event":{"name":"CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security","location":"Scottsdale Arizona USA","acronym":"CCS'14","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones &amp; Mobile Devices"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2666620.2666624","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2666620.2666624","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:14Z","timestamp":1750227134000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2666620.2666624"}},"subtitle":["Barcode-in-Barcode Attacks"],"short-title":[],"issued":{"date-parts":[[2014,11,7]]},"references-count":31,"alternative-id":["10.1145\/2666620.2666624","10.1145\/2666620"],"URL":"https:\/\/doi.org\/10.1145\/2666620.2666624","relation":{},"subject":[],"published":{"date-parts":[[2014,11,7]]},"assertion":[{"value":"2014-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}