Vetting browser extensions for security vulnerabilities with VEX

  • Authors:
  • Sruthi Bandhakavi;Nandit Tiku;Wyatt Pittman;Samuel T. King;P. Madhusudan;Marianne Winslett

  • Affiliations:
  • University of Illinois at Urbana, Champaign;University of Illinois at Urbana, Champaign;University of Illinois at Urbana, Champaign;University of Illinois at Urbana, Champaign;University of Illinois at Urbana, Champaign;University of Illinois at Urbana, Champaign

  • Venue:
  • Communications of the ACM
  • Year:
  • 2011

Quantified Score

Hi-index 48.22

Visualization

Abstract

The browser has become the de facto platform for everyday computation and a popular target for attackers of computer systems. Among the many potential attacks that target or exploit browsers, vulnerabilities in browser extensions have received relatively little attention. Currently, extensions are vetted by manual inspection, which is time consuming and subject to human error. In this paper, we present VEX, a framework for applying static information flow analysis to JavaScript code to identify security vulnerabilities in browser extensions. We describe several patterns of flows that can lead to privilege escalations in Firefox extensions. VEX analyzes Firefox extensions for such flow patterns using high-precision, context-sensitive, flow-sensitive static analysis. We subject 2460 browser extensions to the analysis, and VEX finds 5 of the 18 previously known vulnerabilities and 7 previously unknown vulnerabilities.