QR Code Security
Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Lindsay Munroe, Sebastian
code (Figure 1). Data is accessed lizing QR codes. We give an overview of the error correction
by capturing a photograph of the code using a camera (. capabilities and possible ways to alter both error correction
built into a smartphone) and processing the image with a data and payload in order to either modify or inject informa-
QR reader. tion into existing codes. Furthermore, we explore numerous
vectors that might enable an attacker to exploit either the
user’s trust in the content embedded in the code or auto-
mated processes handling such codes.
Our main contributions are:
• to outline possible modifications to different parts of
QR Codes such as error correction codes or masking,
• to describe resulting attack vectors, both agains
二维码的安全 来自淘豆网m.daumloan.com转载请标明出处.