Information 11 00217 With Cover
Information 11 00217 With Cover
Article
Special Issue
Cyberspace Security, Privacy & Forensics
Edited by
Dr. Avinash Srinivasan
https://doi.org/10.3390/info11040217
information
Article
Security and Privacy of QR Code Applications:
A Comprehensive Study, General Guidelines
and Solutions
Heider A. M. Wahsheh 1,2 and Flaminia L. Luccio 1,∗
1 DAIS, Università Ca’ Foscari Venezia, 30172 Venezia, Italy; [email protected]
2 College of Computer Sciences and Information Technology, King Faisal University, Al-Hassa 31982,
Saudi Arabia
* Correspondence: [email protected]; Tel.: +39-041-2348448
Received: 2 March 2020; Accepted: 14 April 2020; Published: 16 April 2020
Abstract: The widespread use of smartphones is boosting the market take-up of dedicated
applications and among them, barcode scanning applications. Several barcodes scanners are available
but show security and privacy weaknesses. In this paper, we provide a comprehensive security
and privacy analysis of 100 barcode scanner applications. According to our analysis, there are some
apps that provide security services including checking URLs and adopting cryptographic solutions,
and other apps that guarantee user privacy by supporting least privilege permission lists. However,
there are also apps that deceive the users by providing security and privacy protections that are
weaker than what is claimed. We analyzed 100 barcode scanner applications and we categorized
them based on the real security features they provide, or on their popularity. From the analysis,
we extracted a set of recommendations that developers should follow in order to build usable,
secure and privacy-friendly barcode scanning applications. Based on them, we also implemented
BarSec Droid, a proof of concept Android application for barcode scanning. We then conducted a
user experience test on our app and we compared it with DroidLa, the most popular/secure QR code
reader app. The results show that our app has nice features, such as ease of use, provides security
trust, is effective and efficient.
Keywords: QR codes; barcode scanners; Android security; QR code security; QR code privacy
1. Introduction
Barcodes are a universal technology that provides visual data representation using series of lines,
squares or dots, organized in a standard way. The barcode image contains information that identifies
and describes the object it is associated to. In order to extract the encoded data, the user needs a
barcode scanner, i.e., an optical machine that has imaging and processing capabilities (a camera and a
processor). The barcode scanners can be specific devices or smartphone reader applications, and they
require a Line-of-Sight to capture the barcode image and retrieve the stored data [1].
Two dimensional (2D) barcodes are machine readable images that enhance many features of the
traditional one dimensional (1D) barcodes, such as more data capacity and robustness, and so are
suitable for industrial and economic purposes. They can be used in a simple and effective way to
achieve communication between physical objects (such as paper-based surfaces), and the digital ones
(e.g., smartphones) [2].
Quick Response (QR) codes are particular 2D barcodes that have spread dramatically over the
last few years, and they are considered free, simple and effective tools capable to store up to 2953 bytes
that can be retrieved quickly [3]. Recently, new types of QR codes have been proposed that have a
beautified appearance and a higher capacity [4]. QR codes allow users to extract data in three main
modes: online, offline or in a combination of modes. For example, users can use QR codes to connect
to websites, to send emails or read SMS, to save contact numbers, find map coordinates, listen to audio,
or watch videos, etc. [5].
Recent studies show that barcodes can be maliciously used to run different attacks such as:
phishing, malware propagation, cross-site scripting (XSS), SQL/command injection and reader
applications attacks (see, e.g., [6]). Several QR code reader applications claim to provide security
and privacy characteristics. In our opinion, it is important to categorize, evaluate and discuss the
feature of these applications. In this study, we thus analyse 100 barcode scanner applications from
a security and privacy perspective. According to our analysis, there are some apps that provide
security services including URL checking and cryptographic solutions. Other apps guarantee user
privacy by adopting least privilege permission lists. However, there are also apps that deceive the
users by providing security and privacy protections which are weaker than what is claimed. We also
analyze the most popular downloaded apps, since being popular does not imply being secure. Based
on that, we classify the apps into five groups: URL Security, Crypto-based security, Popular, Save
privacy, Weak applications. We recommend a set of tips for developers to build usable, secure and
privacy-friendly applications and we used them to implement BarSec Droid, a proof of concept Android
application for barcode scanning. Finally, we have conducted different experiments to evaluate user
experience on our app compared to DroidLa, the most popular/secure QR code reader [7]. The results
show that applying the design tips will increase the user security trust, improve the user attitude
towards applying security solutions, and increase the awareness of possible attacks. This paper is an
extended version of [8].
1.1. Contributions
Our contributions can be summarized as follows: (i) we present the most comprehensive analysis
of 100 barcode scanner applications from security and privacy perspectives; (ii) we categorize barcode
scanner applications into five groups based on the security features they provide or on their popularity;
(iii) we propose usability, security and privacy recommendations for the development of barcode
scanners; (iv) we present BarSec Droid, a proof of concept QR code Android application that we have
developed; (v) we present the results of a user experience test on BarSec Droid and on DroidLa the
most popular/secure QR code reader, and we discuss the comparison results.
security by using an online questionnaire. The results show differences between users of different
European countries, and also underline the need of security improvements in the QR code processing
phase. Finally, the authors propose a set of design recommendations to improve usability and security
of QR code scanners. The authors present a prototype that checks the online content and adopts digital
signatures, and the results show the efficiency of the protection recommendations. W.r.t. to our work,
the study of [12] analyzes only a small number of applications and does not consider the expected size
or delay overhead of applying digital signature mechanisms.
The study of [13] focuses on 14 Android QR code scanners, explores their security proprieties,
and shows limited capabilities and weaknesses of several apps from a protection point of view.
In particular, some apps directly visit the URL encoded in the barcorde, neither validating it against
threat databases, nor asking user’s permission, thus putting users at a risk of being redirected to
malicious websites. Only two apps, KasperSky [14] and G Data QR code [15] perform validation of the
full URL, and only 8 out of 14 analyzed apps provide security features against phishing and malware
attacks. Finally, the author gives some tips on how to enhance the protection of barcode readers, but,
w.r.t. our work, does not analyze them from a usability perspective.
2. Research Methodology
In this section, we present the research methodology that we used, and we emphasize the
differences with our previous work [8]. Our methodology includes the following six main steps:
1. Application selection: We have searched inside Google Play Store for Android secure and
privacy-friendly barcode reader applications and we have selected 100 of them. This extends the
work of [8] were we only considered 28 apps.
2. Information gathering: We have extracted all the features and permissions from the app descriptions.
3. Application tests: We have installed the apps, evaluated them and compared their capabilities w.r.t.
the app descriptions.
4. Application Categorization: According to the app features, we have divided them into five different
groups, refining the categorization of [8];
5. Recommendation proposal: We have listed guidance tips for developers to build secure and
privacy-friendly barcode reader apps;
6. User security and usability awareness evaluation: We have conducted a user survey to evaluate the
user experience. This survey extends the one of [8], as it was refined and the number of proposed
questions was increased.
3. QR Code Readers
Exploring Google Play Store [16] for secure QR code readers lead to a selection of more than
100 apps. All these apps support the standard scanning service but some of them also claim to provide
security features. According to [12] most barcode scanners apps are not able to protect users against
the selection of malicious QR codes, or against privacy violations. In this study, we aim at studying
barcode reader applications from security, privacy and usability perspectives. Our preliminary results
in [8] showed that several apps, use weak security mechanisms, e.g., weak algorithms or short key
lengths. Moreover, several apps do not follow standard structures or optimal encoding schemes.
Information 2020, 11, 217 4 of 23
Our proposed app, in Section 5 overcomes all these limitations. Table 1 lists the following features of
the selected apps:
Table 1. Cont.
Table 1. Cont.
KasperSky QR Scanner [14] is a free app that checks QR code URLs against malicious Web pages.
The app description does not provide any detail regarding the used protection methods, and the main
limitation of the app is that it allows to directly visits links, detected as benign, without asking for user
confirmation [13].
The Norton Snap QR code scanner [17] is another application that validates QR code URLs against
Web attacks. This app alerts users for benign/malicious links, blocks malicious URLs, and retrieves
the full encoded URL.
Other URL security applications such as: Trend Micro [18], FANSec [19], Dennings [21], Avira [24],
iTechSo [28], KidControl [22], iTechSol [28,49] and X & C Hi-Tech Inc. [27] provide URL checking
services. However, they do not retrieve the full URLs. If the encoded URLs are shortened or redirected,
the users will not be able to check the final URL destination.
QR Code Scanner & Barcode Reader for CM Browser [25] is a lightweight QR code scanner
based on the CM browser: it is the browser itself that provides security services, checks URLs,
and blocks advertisements.
TeaCapps barcode scanner [32] checks URLs by employing Chrome Custom Tabs, which uses
Google Safe Browsing technology [10].
G-Scan and G-tos scan barcode scanners [43,44] check URLs, alert users in case of malicious links
and gets the full expanded URLs.
Table 2 presents a comparison of barcode scanners that provide security by checking URLs
embedded in QR codes.
App Developer Check URL Display URL Get Full URL Direct Open URL Checking Technique
[14] X Xa KasperSky Virusdesk
[15] X X X N/A
[17] X X X Xa Norton Safe Web
[18] X X N/A
[19] X X N/A
[21] X X Google Safe Browsing
[22] X X N/A
[24] X X N/A
[25] X X CM browser
[27] X Xa N/A
[28] X X N/A
[32] X X Google Safe Browsing
[43] X X X N/A
[44] X X X N/A
[49] X X N/A
a Directly opens the URL if it is safe. N/A means not available.
The main limitation of these apps is that URL-checking scanners works against online attacks,
by detecting malicious/suspected Web pages, while other offline attacks such as SQL and command
injections cannot be prevented. Moreover, some of these applications do not provide information
about their URLs checking techniques, i.e., how they classify URLs into benign or malicious.
only the authorized users (who have the decryption key) can retrieve the encoded data. Moreover,
digital signatures can achieve authentication, integrity and non-repudiation. Recent studies also
investigate the use of Visual Secret Sharing schemes for QR Code, to provide additional security
mechanisms, e.g., to online transaction [114]. Choosing the suitable algorithm, key length and
structure are discussed in multiple studies [6,115], but the key factor on barcode usability is the size
overhead [116]. However, there are few applications that offer generating and reading cryptographic
QR codes.
Madiff Net reader application [20] is free and available in several languages, such as: English,
Vietnamese and Chinese. Madiff Net supports scanning and generating password-protected QR codes,
in which the content is encrypted using a shared key between the generator and the barcode reader.
The developer does not mention the used algorithm but keys are 6 bytes of length, and the ciphertext
is a base 64 string. Since the algorithm is unknown, we cannot evaluate the strength of this app.
In addition, Madiff Net uses a base 64 encoding scheme for bytes inside QR codes which causes
size overhead.
QR Droid Private [7] is a free, well-designed interface, which provides scanning and QR code
generation services. This app supports URL shortening, QR code sharing and content encryption.
QR Droid Private adopts a weak encryption algorithm, i.e., Data Encryption Standard (DES) with
breakable key size of 56 bits. It uses a keyword structure, in which the ciphertext is encoded in base 64.
There are two versions, private and full. The private version needs few permissions to generate QR
codes, while the full version needs more permissions.
Crypto Message [23] is a security application that supports an encryption service for encoding
text messages inside QR codes. This application offers the creation of QR codes in the free version,
while decoding requires the paid version. It adopts Advanced Encryption Standard (AES) with
four modes that include: Electronic Codebook (ECB), Cipher Block Chaining (CBC), Counter (CTR),
and Output Feedback (OFB) modes. It uses key size of 128, 192 and 256 bits, and encodes ciphertexts
as hexadecimal or base 64 strings. Finally, Crypto Message is not able to decode barcodes that are
created by other applications.
The algorithm, the key size and the structure of EC QR [33,41,78,79,81,83] are not available and
cannot be evaluated. However, the developers claim they support message encryption and other
security features.
Observe that, all the above mentioned applications have some limitations: (1) They assume no
standard method of encoding cryptographic data in QR codes, i.e., each application adopts its own
structure. Thus, in order to decode a crypto-barcode, the user will need to use the same generating
application, while, on the other hand, the study of [116] suggests the use of the standard JavaScript
Object Notation (JSON) as a general structure to be used with crypto-QR codes. (2) Some of these
applications use weak encryption algorithms such as: DES and AES-ECB. (3) These applications
employ base 64 and hexadecimal strings to represent ciphertexts, which lead to size overhead.
The password-protected QR codes achieve confidentiality and access control, so that only
authorized users who have the key (password) can decrypt and access contents. However, encrypting
the contents is not the optimal mechanism to protect users who scan the QR code, since even encrypted
data may include malicious URLs or offline attacks. Digital Signature can be useful to protect users,
as it employs public-key cryptography, to validate authentication, integrity and non-repudiation of QR
code contents [116]. Table 3 presents a summary of crypto-based QR code scanners and it includes the
app developer, encryption, digital signature (DS), algorithm (Alg), key length (KL), encoding scheme
(EncS), and structure (Str).
Note that, these applications offer a single access control mechanism, the encoded data may either
be public (plain text) or private (ciphertext), thus they do not support QR codes that have an encryped
part and a plaintext at the same time. Moreover, none of the applications support digital signature.
Information 2020, 11, 217 9 of 23
The ZXing library [117] (“zebra crossing”) is a Java source image processing library that is
compatible with several 1D and 2D barcodes and used with various popular applications such as:
ZXing Barcode Scanner [36], Barcode Scanner Pro (10M downloads) [37], and Barcode Scanner [39]
(5M downloads).
Information 2020, 11, 217 10 of 23
ZXing Barcode Scanner [36] is one of the most popular downloaded applications, with more
than 100 million users. It employs [117], shows the barcode format and offers extra information about
embedded links such as: title and redirections.
Other applications that have nearly the same functionalities, and are able to read 1D and 2D
barcodes are QR & Barcode Scanner by [35,38,45] that recorded more than 50M downloads. Moreover,
free QR Scanners Bar Code Scanner & QR Code Reader [40,53] recorded 10M downloads. Private
version of [7,31,80], recorded more than 5 M downloads.
Note that, being popular is not enough to be usable and secure. So we have investigated the
popular applications also from security perspective. [14,17,49] belong to URL and popular groups,
while [34,38,106] belong to popular and Save-Privacy groups. [7] belongs to Crypto and Popular,
and [32] belongs to three groups, i.e., URL, Popular and Save-Privacy. Moreover, we have also
evaluated all tested apps from privacy perspectives (see Tables 4 and 5).
TeaCapps Scanner [28,32] are examples of apps that support checking QR code online contents,
alongside with less permissions (camera and Internet). QR Scanner (Privacy Friendly) [26],
Tokoware [85], Krow QR Code Reader [87], and Habib Khlifi QR Code Reader [108] are all QR
code readers that only ask camera permission. If users are interested in privacy, these are the suitable
application. They are safe and fully compatible with Android devices.
Tokoware [30], Lightning QR code Scanner [34,52,64,69,75,83,91,92,104,112] require access to the
camera and to the network. Thus, all these applications are suitable for users who aim at protecting
their privacy.
Some other apps in Table 4 such as: [38,58,71,73,77,99,106] also ask for Wifi permission that should
not violate the user privacy.
Information 2020, 11, 217 11 of 23
Figure 2. (a) Encoding data in QR Codes. (b) Encrypting and then encoding data in QR Codes.
Moreover, some apps’ descriptions indicate security and privacy features, while testing them shows
that they do not really provide the claimed features such as [51,63,80,101,105,107,110,111]. Other apps
claim they are privacy-friendly but ask for potential permissions that can be used in information leakage
attacks, such as: [29,31,35,42,46–48,50,54–57,59–62,65–68,70,74,76,84,88–90,93–98,100,113]. More details
will be given in the next section.
App Developer DevHis Cont Loc Phn Files Stg Cam Wi-Fi DevInf Net
[7] X X X X
[14] X X X X X X X
[15] X X X X X X
[17] X X X X X X
[18] X X X X X X
[19] X X X X X X X X
[20] X X X X X X X X X
[21] X X X X X X
[22] X X X X
[23] X X X X X
[24] X X X X X X X
[25] X X X X X
[27] X X X X X X X
[29] X X X X X
[31] X X X X X
[33] X X X X
[35] X X X X X X
[36] X X X X X X X X
[37] X X X X X X X
[39] X X X X X X X
[40] X X X X X
[41] X X X X X X
[42] X X X X
[43] X X X X X X X X
[44] X X X X X X X X
[45] X X X X X
[46] X X X X X
[47] X X X X X
[48] X X X X X X X
[49] X X X X X X X X X X
[50] X X X X X X
[51] X X X X X X X X
[53] X X X X X
[54] X X X X X X X X
[55] X X X X X X
[56] X X X X X X
[57] X X X X
[59] X X X X X X
[60] X X X X X X
Information 2020, 11, 217 14 of 23
Table 5. Cont.
App Developer DevHis Cont Loc Phn Files Stg Cam Wi-Fi DevInf Net
[61] X X X X X X
[62] X X X X
[63] X X X X X X X
[65] X X X X
[66] X X X X X X X
[67] X X X X X X
[68] X X X X X
[70] X X X X X
[72] X X X X X X X X
[74] X X X X X X X X
[76] X X X X X X X X X
[78] X X X X
[79] X X X X X
[80] X X X X X X X X
[81] X X X X X
[82] X X X X
[84] X X X X
[88] X X X X X X X
[89] X X X X X X X X
[90] X X X X X X X
[93] X X X X X X X
[94] X X X X X X
[95] X X X X X
[96] X X X X X
[97] X X X X X X
[98] X X X X
[100] X X X X X
[101] X X X X X
[102] X X X X
[103] X X X X
[105] X X X X X X X X
[107] X X X X
[109] X X X X
[110] X X X X
[111] X X X X X X X X X
[113] X X X X X
• Barcode type: Support several barcode types, that can be used in various contexts;
• Barcode format: Display the barcode format, in order to avoid wrong barcode type decoding;
• URL checking: Check URLs inside barcodes to detect malicious ones;
• Warnings: Use security warnings such as browser warnings against suspicious URLs;
• Digital signature: Apply digital signature services, to authenticate the barcode generator,
guarantee data integrity and non-repudiation;
• Encrypted content: Adopt encrypted contents, to achieve confidentiality and access control;
• Limit permissions: Request least-privilege permissions, and prevent accessing private files to
guarantee user privacy. Limit permissions to camera access (to scan the barcode image), and to
Internet (to check URLs);
• Simple interface: Provide default basic functionalities with simple interface, so that non-expert
users can easily use the app;
• Prevent code execution: Prevent the execution of any encoded codes or commands in user
devices;
• Supporting material: Provide manuals and resources for users to learn how to use secure reader
applications.
Example 1. As an example of use assume we have a QR code with the ACL that include these tags: public,
student and teacher, where:
Each tag has authorized users who can access its contents, e.g., a student can read the public tag, and the
student tag but not the teacher tag (since students do not have the teacher key).
Table 6 summarizes the features of the BarSec Droid application. It uses the JSON structure, and it
supports barcodes generated by the BarSec Droid Desktop application, and also barcodes that contain
Access Control Lists (ACLs). It can read standard QR codes that do not include cryptographic data
and that do not follow specific structures. It checks full URLs contained inside barcodes, and checks
their online content using Norton Safe Web service [122].
Information 2020, 11, 217 17 of 23
6. Experimental Results
We have conducted a user survey to get the user reactions about the BarSec Droid usage, and the
level of trust for the provided security information. In order to compare the results with other security
apps, we have chosen the most popular and secure QR code reader, i.e., QR Droid Private [7] that
belongs to the popular and Crypto-based protection group. We followed the recommended sample
size in [123] and conducted a survey with the help of 30 users who were undergraduate students from
different colleges. They were asked to scan ten QR codes for each reader. Then, the users completed
a survey that was built following the lines of three very popular usability surveys [124–126] and a
usability survey on secure mobile applications [127]. Our survey includes the following ten points:
Each point had a five-point scale answer, described as: (1: very unsatisfied to 5: very satisfied).
We have followed the answers evaluation method used on [127] by using paired t-test, which is a
standard statistical method that compares the mean values of two groups. Paired t-test was used
because the survey asked the user to evaluate 2 apps at a time.
Table 7 shows the Means (the value before ±), Mean Standard Error ((MSE), the value after ±),
and p-value results from participants’ feedback for BarSec Droid and QR Droid Private. Note that,
in the t-test, when the p-value is less than 0.05, there is a statistically significant difference between
two groups [128], and in this case the mean value is marked in bold in the table.
Information 2020, 11, 217 18 of 23
According to Table 7, BarSec Droid recorded better answers for easiness of use, security trust,
being likely to use, recommended app, effectively and efficiently. On the other hand, QR Droid Private
recorded a higher level of support information satisfaction and visually appealing, which reflects the
application excellent design and options such as supporting multiple (29) languages. The results of the
time of tasks and the flexibility recorded converged values, which reflects that BarSec Droid and QR
Droid Private have acceptable time delay and flexible capabilities according to the user feedback.
7. Conclusions
This paper presents the most comprehensive evaluation for 100 barcode reader applications
from a point of view of security and privacy issues. We have categorized these apps according to
their features into five groups: URL security, Crypto-based security, Popular, Weak and, Save-privacy
applications. Based on our analysis, we have proposed recommendations towards developing usable,
secure and privacy-friendly applications and implemented BarSec Droid, a proof of concept Android
app that follows our recommendations. Moreover, we have conducted user experiments to assess user
experience on our app, compared to the most popular/secure QR code reader app. The results show
that applying the design recommendations will increase the user security trust, ease of use alongside
with the efficacy and effectiveness of scanning barcodes. As a future work, we plan to extend our
analysis to cover more applications i.e., iOS and Windows phone apps. In addition, we plan to evaluate
the available security mechanisms of QR code online contents such as: Google safe browsing and
Norton Safe Web.
Author Contributions: Conceptualization and Methodology, H.A.M.W. and F.L.L.; Software, Data curation
and Writing—original draft preparation, H.A.M.W.; Writing—review and editing, Supervision and Funding
acquisition, F.L.L. All authors have read and agreed to the published version of the manuscript.
Funding: This research received no external funding.
Conflicts of Interest: The authors declare no conflict of interest.
References
1. Denso Wave. QRcode.com DENSO WAVE. 2017. Available online: http://www.qrcode.com/en (accessed
on 16 April 2020).
2. Zara Rizwan. Do People Use QR Codes in 2017? The Answer Will Definitely Surprise You. 2017. Available
online: https://scanova.io/blog/blog/2017/08/04/do-people-use-qr-codes/ (accessed on 16 April 2020).
3. Dabrowski, A.; Krombholz, K.; Ullrich, J.; Weippl, E. QR Inception: Barcode-in-Barcode Attacks. In
Proceedings of the 4th ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices
(SPSM’14), Scottsdale, AZ, USA, 7 November 2014; pp. 3–10.
4. Cai, H.L.; Yan, B.; Chen, N.; Pan, J.S.; Yang, H.M. Beautified QR code with high storage capacity using
sequential module modulation. Multimed. Tools Appl. 2019, 78, 22575–22599. [CrossRef]
5. Akta, C. The Evolution and Emergence of QR Codes, 1st ed.; Cambridge Scholars Publishing: Cambridge,
UK, 2017.
6. Focardi, R.; Luccio, F.; Wahsheh, H. Security Threats and Solutions for Two Dimensional Barcodes:
A Comparative Study. In Computer and Network Security Essentials; Kevin , D., Ed.; Springer:
Berlin/Heidelberg, Germany, 2018; pp. 207–219.
7. DroidLa. QR Droid Private. 2016. Available online: http://qrdroid.com/ (accessed on 16 April 2020).
Information 2020, 11, 217 19 of 23
8. Wahsheh, H.; Luccio, F. Evaluating Security, Privacy and Usability Features of QR Code Readers. In
Proceedings of the 5th International Conference on Information Systems Security and Privacy (ICISSP 2019),
Prague, Czech Republic, 23–25 February 2019; pp. 266–273.
9. Yao, H.; Shin, D. Towards Preventing QR Code Based for Detecting QR Code Based Attacks on Android
Phone Using Security Warnings. In Proceedings of the 8th ACM SIGSAC ASIA CCS, Hangzhou, China,
7–10 May 2013; pp. 341–346.
10. Google. Google Safe Browsing API, Website. Available online: https://developers.google.com/safe-
browsing/ (accessed on 16 April 2020).
11. Phishtank. Phishtank API, Website. Available online: https://www.phishtank.com/ (accessed on 16 April 2020).
12. Krombholz, K.; Frühwirt, P.; Rieder, T.; Kapsalis, I.; Ullrich, J.; Weippl, E. QR Code Security–How Secure
and Usable Apps Can Protect Users Against Malicious QR Codes. In Proceedings of the 2015 10th
International Conference on Availability, Reliability and Security (ARES), Toulouse, France, 24–27 August
2015; pp. 230–237.
13. Dudheria, R. Evaluating Features and Effectiveness of Secure QR Code Scanners. In Proceedings of the
International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC),
Nanjing, China, 12–14 October 2017; pp. 40–49.
14. KasperSky Lab. QR Code Reader and Scanner: App for Android. 2018. Available online: https://free.
kaspersky.com/?cid=acq-gplay-lnk#mobile (accessed on 16 April 2020).
15. G Data Software AG. G DATA QR Code Scanner. 2018. Available online: https://www.gdata.de/ (accessed
on 16 April 2020).
16. Google Inc. Google Play Store. 2018. Available online: https://play.google.com/store?hl=en (accessed on
16 April 2020).
17. NortonMobile. Norton Snap QR Code Reader. 2016. Available online: https://support.norton.com/sp/en/
us/home/current/solutions/v64691018_EndUserProfile_en_us?client=norton&site=nrtn_en_US (accessed
on 16 April 2020).
18. Trend Micro. QR Scanner-Free, Safe QR Code Reader, Zero Ads. 2018. Available online: https://www.
trendmicro.com/en_us/business.html (accessed on 16 April 2020).
19. FANSec Lab Apps. Secure QR Code Scanner. 2018. Available online: https://play.google.com/store/apps/
details?id=com.fansec.lab.security.secureqrcodescanner (accessed on 16 April 2020).
20. Madiff Net. QR & Barcode Security. 2017. Available online: https://play.google.com/store/apps/details?
id=com.trustbookin.qrcodebarcodesecurity (accessed on 16 April 2020).
21. Dennings. Safe QR-Scanner & Generato. 2018. Available online: http://www.dennings.org/ (accessed on
16 April 2020).
22. KidControl Dev. Safe GeoTag QR Scanner. 2018. Available online: https://web.facebook.com/GeoTagQR?
_rdc=1&_rdr (accessed on 16 April 2020).
23. Tengler, D. Crypto Message. 2018. Available online: https://play.google.com/store/apps/details?id=cz.
crypto_message_free.apk (accessed on 16 April 2020).
24. Avira. Free QR Scanner. 2018. Available online: https://www.avira.com/ (accessed on 16 April 2020).
25. Browser Extension. QR Code Scanner & Barcode Reader for CM Browser 2018. Available online: http:
//www.cmcm.com/en-us/ (accessed on 16 April 2020).
26. SECUSO Research Group. QR Scanner (Privacy Friendly). 2016. Available online: https://secuso.aifb.kit.
edu/index.php (accessed on 16 April 2020).
27. X and C Hi-Tech Inc. Scan 2D Social QR Code Scanner. 2016. Available online: http://www.scan2d.com/
static/index.html (accessed on 16 April 2020).
28. iTechSol. Secure QR Barcode Scanner. 2018. Available online: https://play.google.com/store/apps/details?
id=com.scanner.qr.barcode.reader.bar.codes (accessed on 16 April 2020).
29. Red Dodo. QR & Barcode Reader (Secure). 2014. Available online: http://reddodo.com/qr-barcode-scanner.
php (accessed on 16 April 2020).
30. Tokoware. Private QR Reader Free. 2016. Available online: http://www.tokoware.com/ (accessed on 16
April 2020).
31. FancyApp. QR Code Reader Extreme. 2018. Available online: https://play.google.com/store/apps/details?
id=com.fancyapp.qrcode.barcode.scanner.reader (accessed on 16 April 2020).
Information 2020, 11, 217 20 of 23
59. AapniApps. Qr Barcode Scanner: Scan Multiple Codes at once. 2019. Available online: https://play.google.
com/store/apps/details?id=com.aapnitech.scannerapp (accessed on 16 April 2020).
60. Geegle Tech. QRCode-Secure, Free, Simple Barcode Scanner. 2018. Available online: https://play.google.
com/store/apps/details?id=com.yy.adam.qrcode (accessed on 16 April 2020).
61. National. G.S. Best QR Code & Barcode Scanner. 2019. Available online: https://play.google.com/store/
apps/details?id=com.qrcodescan (accessed on 16 April 2020).
62. Ulterior Services. QR Barcode Scanner and Generator. 2018. Available online: https://play.google.com/
store/apps/details?id=com.ulterior.barcodescanner (accessed on 16 April 2020).
63. Hertikha. QR Code Reader. 2018. Available online: https://play.google.com/store/apps/details?id=com.
perfect.codereader (accessed on 16 April 2020).
64. Dikamjit Borah. Super Ultimate QR Scanner. 2018. Available online: https://play.google.com/store/apps/
details?id=com.dikamjitborah.hobarb.superqrscanner (accessed on 16 April 2020).
65. Spartan Studio Inc. QR Code Reader, Barcode Scanner: QR Code Generator. 2019. Available online: https:
//play.google.com/store/apps/details?id=com.qrcodereader.barcode.codescanner.generator (accessed on
16 April 2020).
66. TPCreative. QR Code & Barcode: Scanner, Reader, Creator. 2019. Available online: https://play.google.
com/store/apps/details?id=tpcreative.co.qrscanner.free.release (accessed on 16 April 2020).
67. HAK Media Team. QR Code Scanner. 2018. Available online: https://play.google.com/store/apps/details?
id=com.hak.qrbarcodescanner (accessed on 16 April 2020).
68. bghavocapps. QR & Barcode Scanner. 2018. Available online: https://play.google.com/store/apps/details?
id=com.bghavocapps.qrandbarcodecodescannerapp (accessed on 16 April 2020).
69. SanjoyBiswas. Qr Scanner Pro:Fast & Secure Scanner. 2018. Available online: https://play.google.com/
store/apps/details?id=com.qrdemo (accessed on 16 April 2020).
70. Apps Wing. Lightning QR Code Scanner: Business Card Generator. 2019. Available online: https:
//play.google.com/store/apps/details?id=com.appswing.qr.barcodescanner.barcodereader (accessed on
16 April 2020).
71. 4 Tech Solutions. Barcode Reader: Barcode Scanner- QR Code Scanner. 2019. Available online: https:
//play.google.com/store/apps/details?id=com.fourtechsolutions.barcodescanner_barcodereader (accessed
on 16 April 2020).
72. PRO APP Master. QR Code Master&Barcode Scanner-Free Safe Fast. 2019. Available online: https:
//play.google.com/store/apps/details?id=oms.mmc.qrscan (accessed on 16 April 2020).
73. Karmkeeda labs. Qr Code Scanner. 2018. Available online: https://play.google.com/store/apps/details?
id=com.appybuilder.videosongs733.Barcode (accessed on 16 April 2020).
74. danny apps. QR Code Reader. 2019. Available online: https://play.google.com/store/apps/details?id=
com.qrcode.reader.codebar (accessed on 16 April 2020).
75. Unger, A. SafeQR. 2018. Available online: https://play.google.com/store/apps/details?id=biz.ungerware.
safeqr (accessed on 16 April 2020).
76. JLeagues. QR Code Reader. 2017. Available online: https://play.google.com/store/apps/details?id=com.
zerg.zxing (accessed on 16 April 2020).
77. Pratik@Devloper. Fast QR and Barcode Scanner. 2018. Available online: https://play.google.com/store/
apps/details?id=com.technicalblogger20.QR_and_Barcode_scanner (accessed on 16 April 2020).
78. SOLEZERO.COM. QR Code Secret. 2019. Available online: https://play.google.com/store/apps/details?
id=com.solezero.android.qrcodesecret (accessed on 16 April 2020).
79. liliandroid. enQRCode: My Encrypted MSG-QR Code. 2019. Available online: https://play.google.com/
store/apps/details?id=com.liliandroid.enqrccmyencryptedmsg (accessed on 16 April 2020).
80. Green Apple Studio. QR Code Reader. 2019. Available online: https://play.google.com/store/apps/
details?id=com.apple.qrcode.reader (accessed on 16 April 2020).
81. SaiFinTex. Secret QrCode. 2019. Available online: https://apkpure.com/secret-qrcode/org.saifintex.qrcode
(accessed on 16 April 2020).
82. pak developer master. QR Code Scanner & Generator 2019. 2019. Available online: https://play.google.
com/store/apps/details?id=qrcode.masterapps.com.pak (accessed on 16 April 2020).
83. Iterative Solution Limited. Global Input App. 2018. Available online: https://play.google.com/store/apps/
details?id=uk.co.globalinput (accessed on 16 April 2020).
Information 2020, 11, 217 22 of 23
109. R2 Development. QR Util-Scan and Create QR. 2019. Available online: https://play.google.com/store/
apps/details?id=com.r2devs.qrutil (accessed on 16 April 2020).
110. AR Inc. QR Coba-QR Code Generator & Scanner. 2019. Available online: https://play.google.com/store/
apps/details?id=qrcode.arinc.com.qrcode (accessed on 16 April 2020).
111. Joe North. QR Code Scanner. 2018. Available online: https://play.google.com/store/apps/details?id=com.
north.qrcode.barcode.reader.scanner.free (accessed on 16 April 2020).
112. mr.newbie limited. EPTLS QR Scan. 2015. Available online: https://play.google.com/store/apps/details?
id=com.mrnewbie.eptls (accessed on 16 April 2020).
113. Gestrs. Gestrs QR Scanner- Ad free, Fast & Secure. 2019. Available online: https://play.google.com/store/
apps/details?id=com.qrcodescan.gestrs (accessed on 16 April 2020).
114. Liu, T.; Yan, B.; Pan, J. Color Visual Secret Sharing for QR Code with Perfect Module Reconstruction. Appl.
Sci. 2019, 9, 4670. [CrossRef]
115. European Union Agency for Network and Information Security (ENISA). Algorithms, Key Size and
Parameters Report—2014. 2014. Available online: https://www.enisa.europa.eu/publications/algorithms-
key-size-and-parameters-report-2014 (accessed on 16 April 2020).
116. Focardi, R.; Luccio, F.; Wahsheh, H.A.M. Usable Cryptographic QR Codes. In Proceedings of the 19th
International Conference on Industrial Technology, Lyon, France, 20–22 February 2018; pp. 1664–1669.
117. GitHub. ZXing Project Home. 2018. Available online: https://github.com/zxing/zxing/ (accessed on
16 April 2020).
118. D’Orazio, C.J.; Choo, K.K.R. A technique to circumvent SSL/TLS validations on iOS devices. Future Gener.
Comput. Syst. 2017, 74, 366–374. [CrossRef]
119. Varela-Vaca, A.; Gasca, R.; Ceballos, R.; Gómez-López, M.; Torres, P. CyberSPL: A Framework for the
Verification of Cybersecurity Policy Compliance of System Configurations Using Software Product Lines.
Appl. Sci. 2019, 9, 5364. [CrossRef]
120. Reeder, R.W.; Felt, A.P.; Consolvo, S.; Malkin, N.; Thompson, C.; Egelman, S. An Experience Sampling Study
of User Reactions to Browser Warnings in the Field. In Proceedings of the 2018 CHI Conference on Human
Factors in Computing Systems, Montreal, QC, Canada, 21–26 April 2018; p. 512.
121. Focardi, R.; Luccio, F.; Wahsheh, H. Usable Security for QR Code. J. Inf. Secur. Appl. 2019, 48, 102396.
[CrossRef]
122. Symantec Corporation. Norton Safe Web. 2018. Available online: https://safeweb.norton.com/ (accessed
on 16 April 2020).
123. Albert, W.; Tullis, T. Measuring the User Experience: Collecting, Analyzing, and Presenting Usability Metrics;
Morgan Kaufmann, Amsterdam, The Netherlands, 2013.
124. Gary Perlman. After Scenario Questionnaire. 2018. Available online: http://garyperlman.com/quest/quest.
cgi?form=ASQ (accessed on 16 April 2020).
125. Gary Perlman. Computer System Usability Questionnaire. 2018. Available online: https://garyperlman.
com/quest/quest.cgi?form=CSUQ (accessed on 16 April 2020).
126. Gary Perlman. USE Questionnaire: Usefulness, Satisfaction, and Ease of Use. 2018. Available online:
https://garyperlman.com/quest/quest.cgi?form=USE (accessed on 16 April 2020).
127. Farb, M.; Lin, Y.H.; Kim, T.H.J.; McCune, J.; Perrig, A. Safeslinger: Easy-to-Use and Secure Public-Key
Exchange. In Proceedings of the 19th annual international conference on Mobile Computing & Networking,
London, UK, 21–25 September 2013; pp. 417–428.
128. StatsDirect Limited. P-Value. 2018. Available online: https://www.statsdirect.com/help/basics/p_values.
htm (accessed on 16 April 2020).
c 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access
article distributed under the terms and conditions of the Creative Commons Attribution
(CC BY) license (http://creativecommons.org/licenses/by/4.0/).