skip to main content
10.1145/2666620.2666624acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

QR Inception: Barcode-in-Barcode Attacks

Published:07 November 2014Publication History

ABSTRACT

2D barcodes offer many benefits compared to 1D barcodes, such as high information density and robustness. Before their introduction to the mobile phone ecosystem, they have been widely used in specific applications, such as logistics or ticketing. However, there are multiple competing standards with different benefits and drawbacks. Therefore, reader applications as well as dedicated devices have to support multiple standards.

In this paper, we present novel attacks based on deliberately caused ambiguities when especially crafted barcodes conform to multiple standards. Implementation details decide which standard the decoder locks on. This way, two users scanning the same barcode with different phones or apps will receive different content. This potentially opens way for multiple problems related to security. We describe how embedding one barcode symbology into another can be used to perform phishing attacks as well as targeted exploits. In addition, we evaluate the extent to which popular 2D barcode reader applications on smartphones are susceptible to these barcode-in barcode attacks. We furthermore discuss mitigation techniques against this type of attack.

References

  1. ISO/IEC 16022: Information technology -- Automatic identification and data capture techniques -- Data Matrix bar code symbology specification.Google ScholarGoogle Scholar
  2. ISO/IEC 18004: Information technology -- Automatic identification and data capture techniques -- QR Code 2005 bar code symbology specification.Google ScholarGoogle Scholar
  3. Official ZXing ("Zebra Crossing") project home. https://github.com/zxing/zxing, accessed July 18th 2014.Google ScholarGoogle Scholar
  4. 3GVision. i-nigma. Apple App Store. https://itunes.apple.com/en/app/id388923203.Google ScholarGoogle Scholar
  5. 3GVision. i-nigma Barcode Scanner. Google Play Store. https://play.google.com/store/apps/details?id=com.threegvision.products.inigma.Android.Google ScholarGoogle Scholar
  6. A. Albertini. corkami: Reverse engineering and visual documentations. http://code.google.com/p/corkami/#Binary_files, accessed September 6th 2014.Google ScholarGoogle Scholar
  7. A. Albertini. This PDF is a JPEG; or, This Proof of Concept is a Picture of Cats. In PoC jj GTFO 0x03. March 2014. http://corkami.googlecode.com/svn/trunk/doc/pocorgtfo/pocorgtfo03.pdf.Google ScholarGoogle Scholar
  8. S. Alvarez and T. Zoller. The death of AV defense in depth - revisiting anti-virus software, 2008. http://cansecwest.com/csw08/csw08-alvarez.pdf.Google ScholarGoogle Scholar
  9. AT&T Services Inc. AT&T Code Scanner: QR,UPC & DM. Google Play Store. https://play.google.com/store/apps/details?id=com.mtag.att.codescanner.Google ScholarGoogle Scholar
  10. M. DeCarlo. AVG: QR code-based malware attacks to rise in 2012, 2012. http: //www.techspot.com/news/47189-avg-qr-code.html, accessed July 18th 2014.Google ScholarGoogle Scholar
  11. DENSO WAVE. History of QR Code. http://www.qrcode.com/en/history/, accessed July 13th 2014.Google ScholarGoogle Scholar
  12. T. Goodspeed, S. Bratus, R. Melgares, R. Shapiro, and R. Speers. Packets in packets: Orson welles' in-band signaling attacks for modern radios. In Proceedings to WOOT 2011, pages 54--61, August 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. M. Inc. Symbol DS6708 Digital Scanner Product Reference Guide, 2009. http://www.motorolasolutions.com/web/Business/Products/Bar%20Code%20Scanning/Bar%20Code%20Scanners/General%20Purpose%20Scanners/_Documents/static_file/ds6708.pdf.Google ScholarGoogle Scholar
  14. ISO/IEC 24778: Information technology -- Automatic identification and data capture techniques -- Aztec Code bar code symbology specification.Google ScholarGoogle Scholar
  15. S. Jana and V. Shmatikov. Abusing File Processing in Malware Detectors for Fun and Profit. In Proceedings of the 33rd IEEE Symposium on Security & Privacy, San Francisco, CA, May 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Kerem Erkan. Qrafter. Apple App Store. https://itunes.apple.com/us/app/id416098700.Google ScholarGoogle Scholar
  17. A. Kharraz, E. Kirda, W. Robertson, D. Balzarotti, and A. Francillon. Optical Delusions: A Study of Malicious QR Codes in the Wild. In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). 06 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. P. Kieseberg, S. Schrittwieser, M. Leithner, M. Mulazzani, E. Weippl, L. Munroe, and M. Sinha. Malicious Pixels Using QR Codes as Attack Vector. In I. Khalil and T. Mantoro, editors, Trustworthy Ubiquitous Computing, volume 6 of Atlantis Ambient and Pervasive Intelligence, pages 21--38. Atlantis Press, 2012.Google ScholarGoogle Scholar
  19. K. Krombholz, P. Frühwirt, P. Kieseberg, I. Kapsalis, M. Huber, and E. Weippl. QR Code Security: A Survey of Attacks and Challenges for Usable Security. In T. Tryfonas and I. Askoxylakis, editors, Human Aspects of Information Security, Privacy, and Trust, volume 8533 of Lecture Notes in Computer Science, pages 79--90. Springer International Publishing, 2014.Google ScholarGoogle Scholar
  20. B. Naik. QR Code: USSD attack, 2012. http://resources.infosecinstitute.com/qr-code-ussd-attack/, accessed July 18th 2014.Google ScholarGoogle Scholar
  21. NeoMedia Technologies, Inc. NeoReader. Apple App Store. https://itunes.apple.com/us/app/id284973754.Google ScholarGoogle Scholar
  22. NeoMedia Technologies Inc. NeoReader QR & Barcode Scanner. Google Play Store. https://play.google.com/store/apps/details?id=de.gavitec.android.Google ScholarGoogle Scholar
  23. K. Peng, H. Sanabria, D. Wu, and C. Zhu. Security Overview of QR Codes. 2014. MIT Student Paper, available online https://courses.csail.mit.edu/6.857/2014/files/12-peng-sanabria-wu-zhu-qr-codes.pdf.Google ScholarGoogle Scholar
  24. L. Sassaman, M. L. Patterson, S. Bratus, M. E. Locasto, and A. Shubina. Security Applications of Formal Language Theory. In IEEE Systems Journal, Volume 7, Issue 3, Sept. 2013.Google ScholarGoogle Scholar
  25. Scanbuy Inc. ScanLife Barcode & QR Code Reader with Prices, Deals, & Reviews. Apple App Store. https://itunes.apple.com/us/app/scanlife-barcode-reader-qr/id285324287.Google ScholarGoogle Scholar
  26. Scanbuy Inc. ScanLife QR & Barcode Reader. Google Play Store. https://play.google.com/store/apps/details?id=com.ScanLife.Google ScholarGoogle Scholar
  27. ShopSavvy Inc. QR Code Reader and Scanner. Apple App Store. https://itunes.apple.com/en/app/qr-code-reader-and-scanner/id388175979.Google ScholarGoogle Scholar
  28. ShopSavvy Inc. ShopSavvy Barcode Scanner. Google Play Store. https://play.google.com/store/apps/details?id=com.biggu.shopsavvy.Google ScholarGoogle Scholar
  29. D. Tam. PayPal offers QR codes for retail-store purchases, October 2013. http://www.cnet.com/news/paypal-offers-qr-codes-for-retail-store-purchases/,accessed July 24th 2014.Google ScholarGoogle Scholar
  30. Ubercoders. UberScanner. Google Play Store. https://play.google.com/store/apps/details?id=org.ubercoders.uberscanner.Google ScholarGoogle Scholar
  31. ZXing Team. Barcode Scanner. Google Play Store. https://play.google.com/store/apps/details?id=com.google.zxing.client.android.Google ScholarGoogle Scholar

Index Terms

  1. QR Inception: Barcode-in-Barcode Attacks

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SPSM '14: Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices
          November 2014
          118 pages
          ISBN:9781450331555
          DOI:10.1145/2666620

          Copyright © 2014 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 7 November 2014

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          SPSM '14 Paper Acceptance Rate11of29submissions,38%Overall Acceptance Rate46of139submissions,33%

          Upcoming Conference

          CCS '24
          ACM SIGSAC Conference on Computer and Communications Security
          October 14 - 18, 2024
          Salt Lake City , UT , USA

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader