{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:40:44Z","timestamp":1776102044387,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,5,18]],"date-time":"2015-05-18T00:00:00Z","timestamp":1431907200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["0846065"],"award-info":[{"award-number":["0846065"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,5,18]]},"DOI":"10.1145\/2742647.2742650","type":"proceedings-article","created":{"date-parts":[[2015,5,11]],"date-time":"2015-05-11T16:31:04Z","timestamp":1431361864000},"page":"359-374","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Analyzing the Use of Quick Response Codes in the Wild"],"prefix":"10.1145","author":[{"given":"Adam","family":"Lerner","sequence":"first","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"Alisha","family":"Saxena","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]},{"given":"Kirk","family":"Ouimet","sequence":"additional","affiliation":[{"name":"Scan Inc., Provo, UT, USA"}]},{"given":"Ben","family":"Turley","sequence":"additional","affiliation":[{"name":"Scan, Inc., Provo, UT, USA"}]},{"given":"Anthony","family":"Vance","sequence":"additional","affiliation":[{"name":"Brigham Young University, Provo, UT, USA"}]},{"given":"Tadayoshi","family":"Kohno","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"Franziska","family":"Roesner","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,5,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2661334.2661366"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/11551201_18"},{"key":"e_1_3_2_1_3_1","volume-title":"Wallet import format","author":"Bitcoin","year":"2014","unstructured":"Bitcoin community. Wallet import format , 2014 . https:\/\/en.bitcoin.it\/wiki\/Wallet_import_format. Bitcoin community. Wallet import format, 2014. https:\/\/en.bitcoin.it\/wiki\/Wallet_import_format."},{"key":"e_1_3_2_1_4_1","unstructured":"A. Cammozzo. TagMeNot 2011. http:\/\/tagmenot.info\/.  A. Cammozzo. TagMeNot 2011. http:\/\/tagmenot.info\/."},{"key":"e_1_3_2_1_5_1","volume-title":"The Who, Why and Where of using QR or action codes for marketing. Smart Insights, sep","author":"Chaffey D.","year":"2012","unstructured":"D. Chaffey . The Who, Why and Where of using QR or action codes for marketing. Smart Insights, sep 2012 . http:\/\/www.smartinsights.com\/mobile-marketing\/qr-code-marketing\/qr-codes-location-demographic-statistics\/. D. Chaffey. The Who, Why and Where of using QR or action codes for marketing. Smart Insights, sep 2012. http:\/\/www.smartinsights.com\/mobile-marketing\/qr-code-marketing\/qr-codes-location-demographic-statistics\/."},{"key":"e_1_3_2_1_6_1","volume-title":"Sept.","year":"2012","unstructured":"Comscore. QR Code Usage Among European Smartphone Owners Doubles Over Past Year , Sept. 2012 . http:\/\/www.comscore.com\/Insights\/Press-Releases\/2012\/9\/QR-Code-Usage-Among-European-Smartphone-Owners-Doubles-Over-Past-Year. Comscore. QR Code Usage Among European Smartphone Owners Doubles Over Past Year, Sept. 2012. http:\/\/www.comscore.com\/Insights\/Press-Releases\/2012\/9\/QR-Code-Usage-Among-European-Smartphone-Owners-Doubles-Over-Past-Year."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666620.2666624"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1514411.1514415"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753462"},{"key":"e_1_3_2_1_10_1","unstructured":"Dogecoin Project. Dogecoin 2014. https:\/\/dogecoin.org\/.  Dogecoin Project. Dogecoin 2014. https:\/\/dogecoin.org\/."},{"key":"e_1_3_2_1_11_1","unstructured":"Google. Google Glass: Setting up Wi-Fi. https:\/\/support.google.com\/glass\/answer\/2725950?hl=en.  Google. Google Glass: Setting up Wi-Fi. https:\/\/support.google.com\/glass\/answer\/2725950?hl=en."},{"key":"e_1_3_2_1_12_1","volume-title":"Forbes","author":"Greenberg A.","year":"2013","unstructured":"A. Greenberg . Google Glass Hacked With QR Code Photobombs . Forbes , July 2013 . http:\/\/www.forbes.com\/sites\/andygreenberg\/2013\/07\/17\/google-glass-hacked-with-qr-code-photobombs\/. A. Greenberg. Google Glass Hacked With QR Code Photobombs. Forbes, July 2013. http:\/\/www.forbes.com\/sites\/andygreenberg\/2013\/07\/17\/google-glass-hacked-with-qr-code-photobombs\/."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208545"},{"key":"e_1_3_2_1_14_1","volume-title":"2013 QR Market Summary: Are QR Codes Dead or Alive? Visualead, dec","author":"Israeli O.","year":"2013","unstructured":"O. Israeli . 2013 QR Market Summary: Are QR Codes Dead or Alive? Visualead, dec 2013 . http:\/\/www.visualead.com\/blog\/2013-qr-market-summary-are-qr-codes-dead-or-alive\/. O. Israeli. 2013 QR Market Summary: Are QR Codes Dead or Alive? Visualead, dec 2013. http:\/\/www.visualead.com\/blog\/2013-qr-market-summary-are-qr-codes-dead-or-alive\/."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1670252.1670305"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1971519.1971593"},{"key":"e_1_3_2_1_17_1","volume-title":"Mac OSX Hints","year":"2012","unstructured":"Kirkmc. Create a QR code bookmarklet . Mac OSX Hints , Dec. 2012 . http:\/\/hints.macworld.com\/article.php?story=2012112105493496&mode=print. Kirkmc. Create a QR code bookmarklet. Mac OSX Hints, Dec. 2012. http:\/\/hints.macworld.com\/article.php?story=2012112105493496&mode=print."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2601468"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488463"},{"key":"e_1_3_2_1_20_1","volume-title":"July","year":"2013","unstructured":"MarketingCharts. Data dive: QR codes , July 2013 . http:\/\/www.marketingcharts.com\/online\/data-dive-qr-codes-29525\/. MarketingCharts. Data dive: QR codes, July 2013. http:\/\/www.marketingcharts.com\/online\/data-dive-qr-codes-29525\/."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.19"},{"key":"e_1_3_2_1_22_1","volume-title":"Dec.","year":"2013","unstructured":"Misterjunky. Samsung S4 Dial pad Phone Codes Discussion. XDA Developers , Dec. 2013 . http:\/\/forum.xda-developers.com\/showthread.php?t=2558791. Misterjunky. Samsung S4 Dial pad Phone Codes Discussion. XDA Developers, Dec. 2013. http:\/\/forum.xda-developers.com\/showthread.php?t=2558791."},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the 13th Annual Network and Distributed Systems Security Symposium (NDSS 2006)","author":"Moshchuk A.","year":"2006","unstructured":"A. Moshchuk , T. Bragin , S. D. Gribble , and H. M. Levy . A crawler-based study of spyware on the web . In Proceedings of the 13th Annual Network and Distributed Systems Security Symposium (NDSS 2006) , 2006 . A. Moshchuk, T. Bragin, S. D. Gribble, and H. M. Levy. A crawler-based study of spyware on the web. In Proceedings of the 13th Annual Network and Distributed Systems Security Symposium (NDSS 2006), 2006."},{"key":"e_1_3_2_1_24_1","volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System","author":"Nakamoto S.","year":"2008","unstructured":"S. Nakamoto . Bitcoin: A Peer-to-Peer Electronic Cash System , 2008 . https:\/\/bitcoin.org\/bitcoin.pdf. S. Nakamoto. Bitcoin: A Peer-to-Peer Electronic Cash System, 2008. https:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"e_1_3_2_1_25_1","volume-title":"ZDNet","author":"Naraine R.","year":"2012","unstructured":"R. Naraine . Google testing login authentication via QR codes . ZDNet , 2012 . http:\/\/www.zdnet.com\/blog\/security\/google-testing-login-authentication-via-qr-codes\/10105. R. Naraine. Google testing login authentication via QR codes. ZDNet, 2012. http:\/\/www.zdnet.com\/blog\/security\/google-testing-login-authentication-via-qr-codes\/10105."},{"key":"e_1_3_2_1_26_1","unstructured":"L. Project. What is litecoin? 2014. https:\/\/litecoin.org\/.  L. Project. What is litecoin? 2014. https:\/\/litecoin.org\/."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2556994"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660319"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCGI.2008.25"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11203-9_4"},{"key":"e_1_3_2_1_31_1","volume-title":"What is a toll-free number and how does it work?","author":"US Federal Communications Commission","year":"2014","unstructured":"US Federal Communications Commission . What is a toll-free number and how does it work? , 2014 . https:\/\/www.fcc.gov\/guides\/toll-free-numbers-and-how-they-work. US Federal Communications Commission. What is a toll-free number and how does it work?, 2014. https:\/\/www.fcc.gov\/guides\/toll-free-numbers-and-how-they-work."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41320-9_4"},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the 13th Annual Network and Distributed Systems Security Symposium (NDSS 2006)","author":"Wang Y.-M.","year":"2006","unstructured":"Y.-M. Wang , D. Beck , X. Jiang , R. Roussev , C. Verbowski , S. Chen , and S. King . Automated web patrol with Strider HoneyMonkeys: Finding web sites that exploit browser vulnerabilities . In Proceedings of the 13th Annual Network and Distributed Systems Security Symposium (NDSS 2006) , 2006 . Y.-M. Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski, S. Chen, and S. King. Automated web patrol with Strider HoneyMonkeys: Finding web sites that exploit browser vulnerabilities. In Proceedings of the 13th Annual Network and Distributed Systems Security Symposium (NDSS 2006), 2006."},{"key":"e_1_3_2_1_34_1","unstructured":"Wikipedia. Rickrolling. http:\/\/en.wikipedia.org\/wiki\/Rickrolling.  Wikipedia. Rickrolling. http:\/\/en.wikipedia.org\/wiki\/Rickrolling."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484357"}],"event":{"name":"MobiSys'15: The 13th Annual International Conference on Mobile Systems, Applications, and Services","location":"Florence Italy","acronym":"MobiSys'15","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2742647.2742650","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2742647.2742650","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:00:33Z","timestamp":1750230033000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2742647.2742650"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5,18]]},"references-count":35,"alternative-id":["10.1145\/2742647.2742650","10.1145\/2742647"],"URL":"https:\/\/doi.org\/10.1145\/2742647.2742650","relation":{},"subject":[],"published":{"date-parts":[[2015,5,18]]},"assertion":[{"value":"2015-05-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}