Abstract
Browser extensions boost the browsing experience by a range of features from automatic translation and grammar correction to password management, ad blocking, and remote desktops. Yet the power of extensions poses significant privacy and security challenges because extensions can be malicious and/or vulnerable. We observe that there are gaps in the previous work on analyzing the security of browser extensions and present a systematic study of attack entry points in the browser extension ecosystem. Our study reveals novel password stealing, traffic stealing, and inter-extension attacks. Based on a combination of static and dynamic analysis we show how to discover extension attacks, both known and novel ones, and study their prevalence in the wild. We show that 1,349 extensions are vulnerable to inter-extension attacks leading to XSS. Our empirical study uncovers a remarkable cluster of "New Tab"extensions where 4,410 extensions perform traffic stealing attacks. We suggest several avenues for the countermeasures against the uncovered attacks, ranging from refining the permission model to mitigating the attacks by declarations in manifest files.
Author supplied keywords
Cite
CITATION STYLE
Eriksson, B., Picazo-Sanchez, P., & Sabelfeld, A. (2022). Hardening the security analysis of browser extensions. In Proceedings of the ACM Symposium on Applied Computing (pp. 1694–1703). Association for Computing Machinery. https://doi.org/10.1145/3477314.3507098
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.