An empirical study of dangerous behaviors in firefox extensions

  • Authors:
  • Jiangang Wang;Xiaohong Li;Xuhui Liu;Xinshu Dong;Junjie Wang;Zhenkai Liang;Zhiyong Feng

  • Affiliations:
  • Department of Computer Science, Tianjin University, China;Department of Computer Science, Tianjin University, China;School of Computing, National University of Singapore, Singapore;School of Computing, National University of Singapore, Singapore;Department of Computer Science, Tianjin University, China;School of Computing, National University of Singapore, Singapore;Department of Computer Science, Tianjin University, China

  • Venue:
  • ISC'12 Proceedings of the 15th international conference on Information Security
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Browser extensions provide additional functionality and customization to browsers. To support such functionality, extensions interact with browsers through a set of APIs of different privilege levels. As shown in previous studies, browser extensions are often granted more privileges than necessary. Extensions can directly threaten the host system as well as web applications, or bring in indirect threats to web sessions by injecting contents into web pages. In this paper, we make an empirical study to analyze extension behaviors, especially the behaviors that affect web sessions. We developed a dynamic technique to track the behaviors of injected scripts and analyzed the impact of these scripts. We analyzed the behaviors of 2465 extensions and discussed their security implications. We also proposed a solution to mitigate indirect threats to web sessions.