Proceedings of the 8th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing 2012
DOI: 10.4108/icst.collaboratecom.2012.250642
|View full text |Cite
|
Sign up to set email alerts
|

Towards Improving Browser Extension Permission Management and User Awareness

Abstract: Browsers have become the de-facto platform for users and their online presence. They have also become a rich environment for 3rd party extensions that enrich the user browsing experience by extending upon the browser's functionalities. Protecting user privacy against malicious or vulnerable extensions is an important task performed by modern browser platforms such as Google Chrome and Safari. To do so, these platforms adopt a per-extension permission model, where each extension is given a set of permissions ba… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…Proposals in this category require users to trust one particular extension and install it consciously. Marouf et al proposed a run-time framework called REM that monitors the access made by extensions and provides customized permission [11]. They developed an extension for monitoring other extension based on REM.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Proposals in this category require users to trust one particular extension and install it consciously. Marouf et al proposed a run-time framework called REM that monitors the access made by extensions and provides customized permission [11]. They developed an extension for monitoring other extension based on REM.…”
Section: Related Workmentioning
confidence: 99%
“…Existing solutions to prevent malicious extensions generally involve changing the browser's internal design [4], [5], [6], strengthening the vetting process of repositories [2], [7], [8], [9], [10], asking users to install yet another (trusted) extension that detects malicious behaviour of other extensions [11], [12] or requiring an external hardware device (e.g., Cronto) that performs out-of-band transaction verification.…”
Section: Introductionmentioning
confidence: 99%