2008
DOI: 10.1007/s11416-007-0078-5
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing web browser security against malware extensions

Abstract: In this paper we examine security issues of functionality extension mechanisms supported by web browsers. Extensions (or "plug-ins") in modern web browsers enjoy unrestrained access at all times and thus are attractive vectors for malware. To solidify the claim, we take on the role of malware writers looking to assume control of a user's browser space. We have taken advantage of the lack of security mechanisms for browser extensions and implemented a malware application for the popular Firefox web browser, whi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
19
0

Year Published

2009
2009
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 65 publications
(20 citation statements)
references
References 10 publications
0
19
0
Order By: Relevance
“…5. Ter Louw et al [23,24] present a code integrity checking mechanism for extension installation and a policy enforcement framework built into XPConnect and SpiderMonkey. In comparison, our approach is lighter, and we do not modify the core components or architecture of Firefox.…”
Section: Related Workmentioning
confidence: 99%
“…5. Ter Louw et al [23,24] present a code integrity checking mechanism for extension installation and a policy enforcement framework built into XPConnect and SpiderMonkey. In comparison, our approach is lighter, and we do not modify the core components or architecture of Firefox.…”
Section: Related Workmentioning
confidence: 99%
“…We evaluated Sabre with four JSEs that had known instances of malicious flows. These included two JSEs that contained exploitable vulnerabilities (Greasemonkey v0.3.3 and Firebug v1.01) and two publicly-available malicious JSEs (FFSniFF [13] and BrowserSpy [41]). …”
Section: Effectivenessmentioning
confidence: 99%
“…Ter-Louw et al [41] were the first to address the security of JSEs. However, as discussed in Section 1, their work was based on monitoring XPCOM calls; being coarse-grained, their approach can have both false positives and negatives.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations