Chrome extensions: Threat analysis and countermeasures

  • Liu L
  • Zhang X
  • Yan G
 et al. 
  • 76


    Mendeley users who have this article in their library.
  • N/A


    Citations of this article.


The widely popular browser extensions now become one of the most commonly used malware attack vectors. The Google Chrome browser, which implements the principles of least privileges and privilege separation by design, of- fers a strong security mechanism to protect malicious web- sites from damaging the whole browser system via exten- sions. In this study, we however reveal that Chrome’s ex- tension security model is not a panacea for all possible at- tacks with browser extensions. Through a series of prac- tical bot-based attacks that can be performed even under typical settings, we demonstrate that malicious Chrome ex- tensions pose serious threats, including both information dispersion and harvesting, to browsers. We further con- duct an in-depth analysis of Chrome’s extension security model, and conclude that its vulnerabilities are rooted from the violation of the principles of least privileges and privi- lege separation. Following these principles, we propose a set of countermeasures that enforce the policies of micro- privilege management and differentiating DOM elements. Using a prototype developed on the latest Chrome browser, we show that they can effectively mitigate the threats posed by malicious Chrome extensions with little effect on normal browsing experience

Get free article suggestions today

Mendeley saves you time finding and organizing research

Sign up here
Already have an account ?Sign in

Find this document

There are no full text links


  • L Liu

  • X Zhang

  • G Yan

  • Songqing Chen

Cite this document

Choose a citation style from the tabs below

Save time finding and organizing research with Mendeley

Sign up for free