A User Study of Security Warnings for Detecting QR Code Based Attacks on Android Phone

نویسندگان

  • Dongwan Shin
  • Huiping Yao
چکیده

The security analysis of existing QR (Quick Response) code scanners on Android was conducted recently and the result shows that most of those QR code scanners were not able to detect attacks exploiting malicious URLs embedded in QR codes, especially phishing and malware attacks. In our previous study, we proposed a QR code scanner solution called SafeQR that utilized two well-known security APIs in order to improve the detection rate of those attacks. In this paper we discuss in detail a user study conducted to investigate the effectiveness of SafeQR, primarily from the perspective of user’s security perception. Specifically, we first discuss how to design the security warnings of SafeQR using Microsoft’s NEAT (Neat, Explained, Actionable, Tested) and SPRUCE (Source, Process, Risk, Unique, Choices and Evidence), and then we present how to design our user study to test their effectiveness. The result of our user study is promising, showing that SafeQR enables better user perception of imminent security threats, compared to other QR code scanners.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quantum Inspired Security on a Mobile Phone

The widespread use of mobile electronic devices increases the complexities of mobile security. This paper aims to provide a secure communication environment for smartphone users. Some research proves that the one-time pad is one of the securest encryption methods, and the key distribution problem can be solved by using the QKD (quantum key distribution). The objective of this project is to desi...

متن کامل

Anti-Phishing framework based on Extended Visual Cryptography and QR code

Nowadays Online transactions are become very common and there are various attacks occur behind this. In these types of various attacks, phishing is very common attack. For detecting this attack various anti-phishing mechanisms are used. Propose a new authentication scheme for se-cure OTP distribution in phishing website detection through EVC and QR codes. The Website Detection using extended vi...

متن کامل

Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture

Since smartphones are usually personal devices full of private information, they are a popular target for a vast variety of real-world attacks such as Code Reuse Attack (CRA). CRAs enable attackers to execute any arbitrary algorithm on a device without injecting an executable code. Since the standard platform for mobile devices is ARM architecture, we concentrate on available ARM-based CRAs. Cu...

متن کامل

A Framework to Prevent QR Code Based Phishing Attacks

Though the rapid development and spread of Information and Communication Technology (ICT) making people's life much more easier, on the other hand it causing some serious threats to the society. Phishing is one of the most common cyber threat, that most users falls in. This research investigate on QR code based phishing attacks which is a newly adopted intrusive method and how to enhance the aw...

متن کامل

Security testing of session initiation protocol implementations

The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JoWUA

دوره 4  شماره 

صفحات  -

تاریخ انتشار 2013