2013
DOI: 10.1007/978-3-642-39235-1_7
|View full text |Cite
|
Sign up to set email alerts
|

Securing Legacy Firefox Extensions with SENTINEL

Abstract: Abstract.A poorly designed web browser extension with a security vulnerability may expose the whole system to an attacker. Therefore, attacks directed at "benign-but-buggy" extensions, as well as extensions that have been written with malicious intents pose significant security threats to a system running such components. Recent studies have indeed shown that many Firefox extensions are over-privileged, making them attractive attack targets. Unfortunately, users currently do not have many options when it comes… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
9
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 12 publications
0
9
0
Order By: Relevance
“…Another dynamic approach was proposed by Onarlioglu [28]. User can use pre-defined or his own security policies to prevent attacks such as remote code execution and password theft.…”
Section: Related Workmentioning
confidence: 99%
“…Another dynamic approach was proposed by Onarlioglu [28]. User can use pre-defined or his own security policies to prevent attacks such as remote code execution and password theft.…”
Section: Related Workmentioning
confidence: 99%
“…This paper is an extended version of the authors' previous work titled Securing Legacy Firefox Extensions with Sentinel [7].…”
Section: Related Workmentioning
confidence: 99%
“…This paper is an extended version of the authors' previous work titled Securing Legacy Firefox Extensions with Sentinel [7]. While the scope of our previous work is limited to proposing a defense against XPCOM-based extension attacks, this paper describes and addresses two additional attack classes (i.e., malicious XUL element manipulations and JavaScript namespace collision exploits) for achieving more comprehensive Firefox extension security.…”
Section: Introductionmentioning
confidence: 99%
“…Due to their privileged position in browsers, it is well understood that extensions pose serious security and privacy threats to user data [7], [8], [9], [10], [11], [12], [13]. Therefore, in order to limit extensions capabilities, a mandatory permission system requires that extensions explicitly declare the set of APIs they effectively need to access.…”
Section: Introductionmentioning
confidence: 99%