Preventing the access of fraudulent WEB sites by using a special two-dimensional code

Nobuyuki Teraura, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Mobile phone users are being increasingly directed to WEB sites through the identification of the WEB address from a two-dimensional code on the phone. However, incidents where mobile phones direct users to malicious WEB sites are also increasing. The direct lead mechanism, in which mobile phones directly send users to an uninspected WEB address, is the most common mechanism by which users are misdirected to fraudulent WEB sites. To address this issue, a registration server for inspecting WEB addresses and storing the corresponding registration IDs in the two-dimensional code format was established. Subsequently, the reliability of directing users to WEB sites only after verifying the registration ID of the target WEB address was examined. However, this approach was susceptible to phishing and camouflage when malicious software was used to rewrite the registration ID and the relationship of the WEB address on the registration server. Therefore, an approach that uses two-dimensional codes with a secret encrypted component was proposed.

Original languageEnglish
Title of host publicationProceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012
Pages645-650
Number of pages6
DOIs
Publication statusPublished - Oct 26 2012
Event6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012 - Palermo, Italy
Duration: Jul 4 2012Jul 6 2012

Publication series

NameProceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012

Other

Other6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012
CountryItaly
CityPalermo
Period7/4/127/6/12

Fingerprint

Mobile phones
Servers
Camouflage
Lead
incident

All Science Journal Classification (ASJC) codes

  • Signal Processing
  • Communication

Cite this

Teraura, N., & Sakurai, K. (2012). Preventing the access of fraudulent WEB sites by using a special two-dimensional code. In Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012 (pp. 645-650). [6296930] (Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012). https://doi.org/10.1109/IMIS.2012.57

Preventing the access of fraudulent WEB sites by using a special two-dimensional code. / Teraura, Nobuyuki; Sakurai, Kouichi.

Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012. 2012. p. 645-650 6296930 (Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Teraura, N & Sakurai, K 2012, Preventing the access of fraudulent WEB sites by using a special two-dimensional code. in Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012., 6296930, Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012, pp. 645-650, 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012, Palermo, Italy, 7/4/12. https://doi.org/10.1109/IMIS.2012.57
Teraura N, Sakurai K. Preventing the access of fraudulent WEB sites by using a special two-dimensional code. In Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012. 2012. p. 645-650. 6296930. (Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012). https://doi.org/10.1109/IMIS.2012.57
Teraura, Nobuyuki ; Sakurai, Kouichi. / Preventing the access of fraudulent WEB sites by using a special two-dimensional code. Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012. 2012. pp. 645-650 (Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012).
@inproceedings{a7f518e06d064b44846c7c4299ba4130,
title = "Preventing the access of fraudulent WEB sites by using a special two-dimensional code",
abstract = "Mobile phone users are being increasingly directed to WEB sites through the identification of the WEB address from a two-dimensional code on the phone. However, incidents where mobile phones direct users to malicious WEB sites are also increasing. The direct lead mechanism, in which mobile phones directly send users to an uninspected WEB address, is the most common mechanism by which users are misdirected to fraudulent WEB sites. To address this issue, a registration server for inspecting WEB addresses and storing the corresponding registration IDs in the two-dimensional code format was established. Subsequently, the reliability of directing users to WEB sites only after verifying the registration ID of the target WEB address was examined. However, this approach was susceptible to phishing and camouflage when malicious software was used to rewrite the registration ID and the relationship of the WEB address on the registration server. Therefore, an approach that uses two-dimensional codes with a secret encrypted component was proposed.",
author = "Nobuyuki Teraura and Kouichi Sakurai",
year = "2012",
month = "10",
day = "26",
doi = "10.1109/IMIS.2012.57",
language = "English",
isbn = "9780769546841",
series = "Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012",
pages = "645--650",
booktitle = "Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012",

}

TY - GEN

T1 - Preventing the access of fraudulent WEB sites by using a special two-dimensional code

AU - Teraura, Nobuyuki

AU - Sakurai, Kouichi

PY - 2012/10/26

Y1 - 2012/10/26

N2 - Mobile phone users are being increasingly directed to WEB sites through the identification of the WEB address from a two-dimensional code on the phone. However, incidents where mobile phones direct users to malicious WEB sites are also increasing. The direct lead mechanism, in which mobile phones directly send users to an uninspected WEB address, is the most common mechanism by which users are misdirected to fraudulent WEB sites. To address this issue, a registration server for inspecting WEB addresses and storing the corresponding registration IDs in the two-dimensional code format was established. Subsequently, the reliability of directing users to WEB sites only after verifying the registration ID of the target WEB address was examined. However, this approach was susceptible to phishing and camouflage when malicious software was used to rewrite the registration ID and the relationship of the WEB address on the registration server. Therefore, an approach that uses two-dimensional codes with a secret encrypted component was proposed.

AB - Mobile phone users are being increasingly directed to WEB sites through the identification of the WEB address from a two-dimensional code on the phone. However, incidents where mobile phones direct users to malicious WEB sites are also increasing. The direct lead mechanism, in which mobile phones directly send users to an uninspected WEB address, is the most common mechanism by which users are misdirected to fraudulent WEB sites. To address this issue, a registration server for inspecting WEB addresses and storing the corresponding registration IDs in the two-dimensional code format was established. Subsequently, the reliability of directing users to WEB sites only after verifying the registration ID of the target WEB address was examined. However, this approach was susceptible to phishing and camouflage when malicious software was used to rewrite the registration ID and the relationship of the WEB address on the registration server. Therefore, an approach that uses two-dimensional codes with a secret encrypted component was proposed.

UR - http://www.scopus.com/inward/record.url?scp=84867724864&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84867724864&partnerID=8YFLogxK

U2 - 10.1109/IMIS.2012.57

DO - 10.1109/IMIS.2012.57

M3 - Conference contribution

AN - SCOPUS:84867724864

SN - 9780769546841

T3 - Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012

SP - 645

EP - 650

BT - Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012

ER -