Doublex: Statically detecting vulnerable data flows in browser extensions at scale

A Fass, DF Somé, M Backes, B Stock - Proceedings of the 2021 ACM …, 2021 - dl.acm.org
Browser extensions are popular to enhance users' browsing experience. By design, they
have access to security-and privacy-critical APIs to perform tasks that web applications …

CoCo: Efficient Browser Extension Vulnerability Detection via Coverage-guided, Concurrent Abstract Interpretation

J Yu, S Li, J Zhu, Y Cao - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Extensions complement web browsers with additional functionalities and also bring new
vulnerability venues, allowing privilege escalations from adversarial web pages to use …

Mystique: Uncovering information leakage from browser extensions

Q Chen, A Kapravelos - Proceedings of the 2018 ACM SIGSAC …, 2018 - dl.acm.org
Browser extensions are small JavaScript, CSS and HTML programs that run inside the
browser with special privileges. These programs, often written by third parties, operate on …

Fingerprinting in style: Detecting browser extensions via injected style sheets

P Laperdrix, O Starov, Q Chen, A Kapravelos… - 30th USENIX Security …, 2021 - usenix.org
Browser extensions enhance the web experience and have seen great adoption from users
in the past decade. At the same time, past research has shown that online trackers can use …

You've changed: Detecting malicious browser extensions through their update deltas

N Pantelaios, N Nikiforakis, A Kapravelos - Proceedings of the 2020 …, 2020 - dl.acm.org
In this paper, we conduct the largest to-date analysis of browser extensions, by investigating
922,684 different extension versions collected in the past six years, and using this data to …

EmPoWeb: empowering web applications with browser extensions

DF Somé - 2019 IEEE Symposium on Security and Privacy (SP), 2019 - ieeexplore.ieee.org
Browser extensions are third party programs, tightly integrated to browsers, where they
execute with elevated privileges in order to provide users with additional functionalities …

Everyone is different: Client-side diversification for defending against extension fingerprinting

E Trickel, O Starov, A Kapravelos, N Nikiforakis… - 28th USENIX Security …, 2019 - usenix.org
Browser fingerprinting refers to the extraction of attributes from a user's browser which can
be combined into a near-unique fingerprint. These fingerprints can be used to re-identify …

Unnecessarily Identifiable: Quantifying the fingerprintability of browser extensions due to bloat

O Starov, P Laperdrix, A Kapravelos… - The World Wide Web …, 2019 - dl.acm.org
In this paper, we investigate to what extent the page modifications that make browser
extensions fingerprintable are necessary for their operation. We characterize page …

Understanding worldwide private information collection on android

Y Shen, PA Vervier, G Stringhini - arXiv preprint arXiv:2102.12869, 2021 - arxiv.org
Mobile phones enable the collection of a wealth of private information, from unique
identifiers (eg, email addresses), to a user's location, to their text messages. This information …

What is in the Chrome Web Store?

S Hsu, M Tran, A Fass - 2024 - publications.cispa.de
This paper is the first attempt at providing a holistic view of the Chrome Web Store (CWS).
We leverage historical data provided by ChromeStats to study global trends in the CWS and …