{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T05:49:17Z","timestamp":1775886557315,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,24]]},"DOI":"10.1145\/3779657.3779681","type":"proceedings-article","created":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T05:12:49Z","timestamp":1775884369000},"page":"157-163","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Simulating QR Code Scanner Phishing Attacks: Investigating Vulnerabilities in QR Scanning and Reading Mechanisms Leading to Cookie and Data Exposure in Organization Environment"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7189-3040","authenticated-orcid":false,"given":"Eric","family":"Blancaflor","sequence":"first","affiliation":[{"name":"Mapua University, School of Information Technology, Manila, Metro Manila, Philippines"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-3648-3477","authenticated-orcid":false,"given":"Michelle","family":"Algabre","sequence":"additional","affiliation":[{"name":"Mapua University, School of Information Technology, Manila, Metro Manila, Philippines"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-0355-7848","authenticated-orcid":false,"given":"Clyde Justin","family":"Angeles","sequence":"additional","affiliation":[{"name":"Mapua University, School of Information Technology, Manila, Metro Manila, Philippines"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-2507-9972","authenticated-orcid":false,"given":"Andrei","family":"Goc-Ong","sequence":"additional","affiliation":[{"name":"Mapua University, School of Information Technology, Manila, Metro Manila, Philippines"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-8714-2262","authenticated-orcid":false,"given":"Enrique Karl","family":"Liberato","sequence":"additional","affiliation":[{"name":"Mapua University, School of Information Technology, Manila, Metro Manila, Philippines"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6528-5631","authenticated-orcid":false,"given":"Lester","family":"Ladera","sequence":"additional","affiliation":[{"name":"Ramon Magsaysay Memorial Colleges, Marbel Inc., School of Information Technology, Kotabato, Mindanao, Philippines"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1345-2335","authenticated-orcid":false,"given":"William","family":"Rey","sequence":"additional","affiliation":[{"name":"Mapua University, School of Information Technology, Manila, Metro Manila, Philippines"}]}],"member":"320","published-online":{"date-parts":[[2026,4,10]]},"reference":[{"key":"e_1_3_3_1_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/iccakm46823.2020.9051470"},{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3291811"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2022922425"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2407.16230"},{"key":"e_1_3_3_1_5_2","unstructured":"APWG \u201cPhishing E-mail Reports and Phishing Site Trends 4 Brand-Domain Pairs Measurement 5 Brands & Legitimate Entities Hijacked by E-mail Phishing Attacks 6 Use of Domain Names for Phishing 7-9 Phishing and Identity Theft in Brazil 10-11 Most Targeted Industry Sectors 12 APWG Phishing Trends Report Contributors 13 \u201d May 2022."},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.05.082"},{"key":"e_1_3_3_1_7_2","volume-title":"Barrcuda Blog","author":"Blanker K.","year":"2024","unstructured":"K. Blanker, \u201cThreat Spotlight: The evolving use of QR codes in phishing attacks,\u201d Barrcuda Blog, Oct. 22, 2024."},{"key":"e_1_3_3_1_8_2","unstructured":"https:\/\/blog.barracuda.com\/2024\/10\/22\/threat-spotlight-evolving-qr-codes-phishing-attacks"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.19101\/ijatee.2021.875031"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/3549015.3554172"},{"key":"e_1_3_3_1_11_2","volume-title":"Ars Technica","author":"Edwards B.","year":"2023","unstructured":"B. Edwards, \u201cRedditor creates working anime QR codes using Stable Diffusion,\u201d Ars Technica, Jun. 06, 2023."},{"key":"e_1_3_3_1_12_2","unstructured":"https:\/\/arstechnica.com\/information-technology\/2023\/06\/redditor-creates-working-anime-qr-codes-using-stablediffusion\/?utm_brand=arstechnica&utm_social-type=owned&utm_source=mastodon&utm_medium=social (accessed Oct. 30 2024)."},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07620-1_8"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2024.23050"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAIE51753.2021.9431807"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2024.06.004"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-65127-9_25"},{"key":"e_1_3_3_1_18_2","first-page":"13","volume-title":"JISAR","volume":"16","author":"Homan J.","year":"2023","unstructured":"J. Homan and J. Breese, \u201cQR Code Hacking \u2013 Detecting Multiple Vulnerabilities in Android Scanning Software,\u201d JISAR, vol. 16, no. 1, p. 13, 2023, Available: https:\/\/jisar.org\/2023-16\/n1\/JISARv16n1p13.html"}],"event":{"name":"WSSE 2025: 2025 The 7th World Symposium on Software Engineering","location":"Okayama Japan","acronym":"WSSE 2025"},"container-title":["Proceedings of the 2025 7th World Symposium on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3779657.3779681","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T05:14:09Z","timestamp":1775884449000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3779657.3779681"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,24]]},"references-count":18,"alternative-id":["10.1145\/3779657.3779681","10.1145\/3779657"],"URL":"https:\/\/doi.org\/10.1145\/3779657.3779681","relation":{},"subject":[],"published":{"date-parts":[[2025,10,24]]},"assertion":[{"value":"2026-04-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}