Fig 3 - uploaded by Julinda Stefa
Content may be subject to copyright.
Screenshot of two mobile apps employing scan-and-pay through QR-code to read the address of the payee.

Screenshot of two mobile apps employing scan-and-pay through QR-code to read the address of the payee.

Source publication
Preprint
Full-text available
Mobile payments have increased significantly in the recent years and one-to-one money transfers are offered by a wide variety of smartphone applications. These applications usually support scan-and-pay -- a technique that allows a payer to easily scan the destination address of the payment directly from the payee's smartphone screen. This technique...

Contexts in source publication

Context 1
... [21] is one very popular wallet app in India with more than 100M installations. The Paytm app features the scan-and-pay technique in a same way as the Bitcoin wallet app: The payee shows the QR-code that encodes his address (see Figure 3(a)) and the payer scans it and then send the money. Therefore, it is just as vulnerable to our attack as the Bitcoin Wallet one. ...
Context 2
... [23], the app of the Italian postal and financial services provider, is another mobile application with more than 5M installs that feature the same scan-and-pay technique through QR-code for person-to-person payments (see Figure 3(b)). We modify Malview and implement another proof-of-concept malware that targets Postepay. ...
Context 3
... [21] is one very popular wallet app in India with more than 100M installations. The Paytm app features the scan-and-pay technique in a same way as the Bitcoin wallet app: The payee shows the QR-code that encodes his address (see Figure 3(a)) and the payer scans it and then send the money. Therefore, it is just as vulnerable to our attack as the Bitcoin Wallet one. ...
Context 4
... [23], the app of the Italian postal and financial services provider, is another mobile application with more than 5M installs that feature the same scan-and-pay technique through QR-code for person-to-person payments (see Figure 3(b)). We modify Malview and implement another proof-of-concept malware that targets Postepay. ...

Similar publications

Conference Paper
Full-text available
Recently, adversarial deception becomes one of the most considerable threats to deep neural networks. However, compared to extensive research in new designs of various adversarial attacks and defenses, the neural networks' intrinsic robustness property is still lack of thorough investigation. This work aims to qualitatively interpret the adversaria...
Preprint
Full-text available
We consider membership inference attacks, one of the main privacy issues in machine learning. These recently developed attacks have been proven successful in determining, with confidence better than a random guess, whether a given sample belongs to the dataset on which the attacked machine learning model was trained. Several approaches have been de...
Article
Full-text available
The immune system is generally known to be the primary defense mechanism against pathogens. Any pathological conditions are reflected in anomalies in the immune system parameters. Increasing evidence suggests the involvement of immune dysregulation and neuroinflammation in the pathogenesis of schizophrenia. In this systematic review, we summarized...
Article
Full-text available
Abstract Despite the impressive performances reported by deep neural networks in different application domains, they remain largely vulnerable to adversarial examples, i.e., input samples that are carefully perturbed to cause misclassification at test time. In this work, we propose a deep neural rejection mechanism to detect adversarial examples, b...