2009 Annual Computer Security Applications Conference 2009
DOI: 10.1109/acsac.2009.43
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing Information Flow in JavaScript-Based Browser Extensions

Abstract: JavaScript-based browser extensions (JSEs) enhance the core functionality of web browsers by improving their look and feel, and are widely available for commodity browsers. To enable a rich set of functionalities, browsers typically execute JSEs with elevated privileges. For example, unlike JavaScript code in a web application, code in a JSE is not constrained by the same-origin policy. Malicious JSEs can misuse these privileges to compromise confidentiality and integrity, e.g., by stealing sensitive informati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
66
0
2

Year Published

2012
2012
2022
2022

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 104 publications
(68 citation statements)
references
References 16 publications
0
66
0
2
Order By: Relevance
“…In a line of work to secure JavaScript in browser extensions, Dhawan and Ganapathy [8] develop Sabre, a system for tracking the flow of JavaScript objects as they are passed through the browser subsystems. Bandhakavi, et al [2] propose a static analysis tool, VEX, for analyzing Firefox extensions for security vulnerabilities.…”
Section: Resultsmentioning
confidence: 99%
“…In a line of work to secure JavaScript in browser extensions, Dhawan and Ganapathy [8] develop Sabre, a system for tracking the flow of JavaScript objects as they are passed through the browser subsystems. Bandhakavi, et al [2] propose a static analysis tool, VEX, for analyzing Firefox extensions for security vulnerabilities.…”
Section: Resultsmentioning
confidence: 99%
“…This research has aimed to develop, then to use, flexible and efficient systems that satisfy non-interference properties. For instance, this research effectively supports promising uses of dynamic information-flow control in Web browsers [5,8,12,21]. This research is often clever and intricate-so we do not attempt to give a complete description here, but we focus on some of the intricacies below.…”
Section: Static and Dynamic Language-based Information-flow Controlmentioning
confidence: 99%
“…Djeric and Goel [19] investigate different classes of privilege-escalation vulnerabilities found in Firefox extensions, and propose a tainting-based system to detect them. Similarly, Dhawan and Ganapathy [20] propose SABRE, a framework for dynamically tracking in-browser information flows to detect when a JavaScript extension attempts to compromise browser security. Guha et al [21] propose IBEX, a framework for extension authors to develop extensions with verifiable access control policies, and for curators to detect policy-violating extensions through static analysis.…”
Section: Related Workmentioning
confidence: 99%