Abstract | ||
---|---|---|
2D barcodes offer many benefits compared to 1D barcodes, such as high information density and robustness. Before their introduction to the mobile phone ecosystem, they have been widely used in specific applications, such as logistics or ticketing. However, there are multiple competing standards with different benefits and drawbacks. Therefore, reader applications as well as dedicated devices have to support multiple standards. In this paper, we present novel attacks based on deliberately caused ambiguities when especially crafted barcodes conform to multiple standards. Implementation details decide which standard the decoder locks on. This way, two users scanning the same barcode with different phones or apps will receive different content. This potentially opens way for multiple problems related to security. We describe how embedding one barcode symbology into another can be used to perform phishing attacks as well as targeted exploits. In addition, we evaluate the extent to which popular 2D barcode reader applications on smartphones are susceptible to these barcode-in barcode attacks. We furthermore discuss mitigation techniques against this type of attack. |
Year | DOI | Venue |
---|---|---|
2014 | 10.1145/2666620.2666624 | SPSM@CCS |
Keywords | Field | DocType |
steganography,barcode,qr,security,packet-in-packet,protocol decoding ambiguity | Information density,Steganography,Barcode reader,Internet privacy,Phishing,Computer science,Computer security,Exploit,Robustness (computer science),Mobile phone,Barcode | Conference |
Citations | PageRank | References |
10 | 0.69 | 5 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Adrian Dabrowski | 1 | 60 | 8.51 |
Katharina Krombholz | 2 | 126 | 13.08 |
Johanna Ullrich | 3 | 61 | 8.51 |
Edgar Weippl | 4 | 856 | 105.02 |