2014
DOI: 10.1007/978-3-319-13841-1_15
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Leakage Attacks in Browsers by Colluding Extensions

Abstract: Abstract. Browser Extensions (BE) enhance the core functionality of the Browser and provide customization to it. Browser extensions enjoy high privileges, sometimes with the same privileges as Browser itself. As a consequence, a vulnerable or malicious extension might expose Browser and system resources to attacks. This may put Browser resources at risk of unwanted operations, privilege escalation etc. BE can snoop on web applications, launch arbitrary processes, and even access files from host file system. In… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…In the following demonstration, we assume that a malicious extension is already installed on a client's browser. This can be done through disguising malicious extensions as legitimate browser extensions, using Trojans to install such extensions, missing plug-in attacks, or purchasing popular extensions and then adding malicious code during updates [15], [3]. In both attacks, the web pages that are presented to the victim are from the genuine banking websites via HTTPS.…”
Section: B Attack Modelmentioning
confidence: 99%
“…In the following demonstration, we assume that a malicious extension is already installed on a client's browser. This can be done through disguising malicious extensions as legitimate browser extensions, using Trojans to install such extensions, missing plug-in attacks, or purchasing popular extensions and then adding malicious code during updates [15], [3]. In both attacks, the web pages that are presented to the victim are from the genuine banking websites via HTTPS.…”
Section: B Attack Modelmentioning
confidence: 99%