Memoirs of a browser: a cross-browser detection model for privacy-breaching extensions

  • Authors:
  • Cristiano Giuffrida;Stefano Ortolani;Bruno Crispo

  • Affiliations:
  • Vrije Universiteit Amsterdam, Amsterdam, The Netherlands;Vrije Universiteit Amsterdam, Amsterdam, The Netherlands;University of Trento, Trento, Italy

  • Venue:
  • Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Web browsers are undoubtedly one of the most popular user applications. This is even more evident in recent times, with Google introducing a platform where the browser is the only application provided to the user. With their modular and extensible architecture, modern browsers are also an appealing platforms for third-party software developers, who can easily publish new extensions to extend any standard web browser functionality. Extendability is a crucial feature that makes web browsers a very attractive service platform. From a security perspective, however, extensions opened up new opportunities for attacks. Most extensions do not require any special privilege to be installed, despite their ability to access all the user private data. Delegating the decision about extension's security to trusted parties is not a conclusive solution, given that privacy-breaching behavior has been found even in store-approved extensions [1].