Cross miniapp request forgery: Root causes, attacks, and vulnerability detection

Y Yang, Y Zhang, Z Lin - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
A miniapp is a full-fledged app that is executed inside a mobile super app such as WeChat
or SnapChat. Being mini by nature, it often has to communicate with other miniapps to …

Taintmini: Detecting flow of sensitive data in mini-programs with static taint analysis

C Wang, R Ko, Y Zhang, Y Yang… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Mini-programs, which are programs running inside mobile super apps such as WeChat,
often have access to privacy-sensitive information, such as location data and phone …

CoCo: Efficient Browser Extension Vulnerability Detection via Coverage-guided, Concurrent Abstract Interpretation

J Yu, S Li, J Zhu, Y Cao - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Extensions complement web browsers with additional functionalities and also bring new
vulnerability venues, allowing privilege escalations from adversarial web pages to use …

Scaling javascript abstract interpretation to detect and exploit node. js taint-style vulnerability

M Kang, Y Xu, S Li, R Gjomemo, J Hou… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Taint-style vulnerabilities, such as OS command injection and path traversal, are common
and severe software weaknesses. There exists an inherent trade-off between analysis …

Arcanum: detecting and evaluating the privacy risks of browser extensions on web pages and web content

Q Xie, MVK Murali, P Pearce, F Li - 33rd USENIX Security Symposium …, 2024 - usenix.org
Modern web browsers support rich extension ecosystems that provide users with
customized and flexible browsing experiences. Unfortunately, the flexibility of extensions …

Detection of inconsistencies in privacy practices of browser extensions

D Bui, B Tang, KG Shin - 2023 IEEE Symposium on Security …, 2023 - ieeexplore.ieee.org
All major web browsers support extensions to provide additional functionalities and enhance
users' browsing experience while the extensions can access and collect users' data during …

Extending a hand to attackers: browser privilege escalation attacks via extensions

YM Kim, B Lee - 32nd usenix security symposium (usenix security 23), 2023 - usenix.org
Web browsers are attractive targets of attacks, whereby attackers can steal security-and
privacy-sensitive data, such as online banking and social network credentials, from users …

MalWuKong: Towards Fast, Accurate, and Multilingual Detection of Malicious Code Poisoning in OSS Supply Chains

N Li, S Wang, M Feng, K Wang… - 2023 38th IEEE/ACM …, 2023 - ieeexplore.ieee.org
In the face of increased threats within software registries and management systems, we
address the critical need for effective malicious code detection. In this paper, we propose an …

HiddenCPG: large-scale vulnerable clone detection using subgraph isomorphism of code property graphs

S Wi, S Woo, JJ Whang, S Son - … of the ACM Web Conference 2022, 2022 - dl.acm.org
A code property graph (CPG) is a joint representation of syntax, control flows, and data flows
of a target application. Recent studies have demonstrated the promising efficacy of …

WeMinT: Tainting Sensitive Data Leaks in WeChat Mini-Programs

S Meng, L Wang, S Wang, K Wang… - 2023 38th IEEE/ACM …, 2023 - ieeexplore.ieee.org
Mini-programs (MiniApps), lightweight versions of full-featured mobile apps that run inside a
host app such as WeChat, have become increasingly popular due to their simplified and …