Skip to main content

Investigating Users’ Perception, Security Awareness and Cyber-Hygiene Behaviour Concerning QR Code as an Attack Vector

  • Conference paper
  • First Online:
HCI International 2022 Posters (HCII 2022)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1583))

Included in the following conference series:

  • 1195 Accesses

Abstract

A quick response (QR) code is a two-dimensional barcode that is used for displaying or scanning information. Nowadays, it is exploited for cyber-fraud due to its mass adoption and non-textual nature. In this survey paper, we conducted an anonymous survey of 132 people with basic familiarity with QR codes to investigate and understand users’ awareness, perception, and cyber-hygiene behaviour towards QR codes and its malicious use. Analysis of the survey data indicates that more than half of the participants have security concerns about using a QR code, however they still use it. More than one third of the total participants have no such concerns. A similar percentage of the participants were unaware of any security risk associated with QR codes. Moreover, we found bias towards certain factors by the participants for classifying a QR code as benign or malicious, for example, presence of brand logo, higher pixel density and larger QR size are assumed to indicate a trustworthy QR code. Our findings indicate that there is a noticeable gap between how users perceive QR code-based threats and their actual security awareness related to them, and thus require technology-based assistance.

S. Jain—The author was working full time at TCS Research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Anell, S., Gröber, L., Krombholz, K.: End user and expert perceptions of threats and potential countermeasures. In: 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pp. 230–239. IEEE (2020)

    Google Scholar 

  2. Dabrowski, A., Krombholz, K., Ullrich, J., Weippl, E.R.: QR inception: barcode-in-barcode attacks. In: Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, pp. 3–10 (2014)

    Google Scholar 

  3. Focardi, R., Luccio, F.L., Wahsheh, H.A.: Usable security for QR code. J. Inf. Secur. Appl. 48, 102369 (2019)

    Google Scholar 

  4. Kharraz, A., Kirda, E., Robertson, W., Balzarotti, D., Francillon, A.: Optical delusions: a study of malicious QR codes in the wild. In: 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 192–203. IEEE (2014)

    Google Scholar 

  5. Kieseberg, P., et al.: Malicious pixels using QR codes as attack vector. In: Khalil, I., Mantoro, T. (eds.) Trustworthy Ubiquitous Computing. ATLANTISAPI, vol. 6, pp. 21–38. Springer, Heidelberg (2012). https://doi.org/10.2991/978-94-91216-71-8_2

  6. Krombholz, K., Frühwirt, P., Kieseberg, P., Kapsalis, I., Huber, M., Weippl, E.: QR code security: a survey of attacks and challenges for usable security. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 79–90. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-07620-1_8

  7. Lerner, A., et al.: Analyzing the use of quick response codes in the wild. In: Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services, pp. 359–374 (2015)

    Google Scholar 

  8. Seeburger, J.: No cure for curiosity: linking physical and digital urban layers. In: Proceedings of the 7th Nordic Conference on Human-Computer Interaction: Making Sense Through Design, pp. 247–256 (2012)

    Google Scholar 

  9. Thompson, N., Lee, K.: Are QR codes the next phishing risk? ACS Inf. Age Sep/Oct, 36–37 (2012). https://researchrepository.murdoch.edu.au/id/eprint/10605/

  10. Vidas, T., Owusu, E., Wang, S., Zeng, C., Cranor, L.F., Christin, N.: QRishing: the susceptibility of smartphone users to QR code phishing attacks. In: Adams, A.A., Brenner, M., Smith, M. (eds.) FC 2013. LNCS, vol. 7862, pp. 52–69. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-41320-9_4

  11. Wahsheh, H.A., Luccio, F.L.: Security and privacy of QR code applications: a comprehensive study, general guidelines and solutions. Information 11(4), 217 (2020)

    Google Scholar 

  12. Wash, R., Rader, E., Fennell, C.: Can people self-report security accurately? Agreement between self-report and behavioral measures. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 2228–2232 (2017)

    Google Scholar 

  13. Yao, H., Shin, D.: Towards preventing QR code based attacks on android phone using security warnings. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 341–346 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manish Shukla .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kumar, N., Jain, S., Shukla, M., Lodha, S. (2022). Investigating Users’ Perception, Security Awareness and Cyber-Hygiene Behaviour Concerning QR Code as an Attack Vector. In: Stephanidis, C., Antona, M., Ntoa, S. (eds) HCI International 2022 Posters. HCII 2022. Communications in Computer and Information Science, vol 1583. Springer, Cham. https://doi.org/10.1007/978-3-031-06394-7_64

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-06394-7_64

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-06393-0

  • Online ISBN: 978-3-031-06394-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics