Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy 2017
DOI: 10.1145/3029806.3029820
|View full text |Cite
|
Sign up to set email alerts
|

Discovering Browser Extensions via Web Accessible Resources

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
36
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 40 publications
(36 citation statements)
references
References 13 publications
0
36
0
Order By: Relevance
“…However, because of the way addons are integrated in browsers, it is possible to detect some of them. A study conducted by Sjösten et al looked at the use of web accessible resources to detect extensions [103]. By accessing very specific URLs, they can know if an extension is installed or not.…”
Section: Canvas Javascriptmentioning
confidence: 99%
“…However, because of the way addons are integrated in browsers, it is possible to detect some of them. A study conducted by Sjösten et al looked at the use of web accessible resources to detect extensions [103]. By accessing very specific URLs, they can know if an extension is installed or not.…”
Section: Canvas Javascriptmentioning
confidence: 99%
“…If a specific extension's elements or behavior are unique among all extensions, then a page can uniquely identify (i.e., fingerprint) it. Identifying exposed resources in Chrome is a straightforward process that has been demonstrated before [24], [47]. On the other hand, uniquely identifying extensions based on their behavior is a challenging task that presents several obstacles in practice.…”
Section: Background and Threat Modelmentioning
confidence: 99%
“…As mentioned previously, prior studies have demonstrated the feasibility of browser extension enumeration and fingerprintability. These studies focused their efforts on identifying extensions that expose specific resources (i.e., WAR-based enumeration) either directly [24], [47] or with clever implicit approaches [44], [46]. In the following subsections we provide technical details and outline the fingerprint generation and extension detection process for our four techniques.…”
Section: System Design and Implementationmentioning
confidence: 99%
See 2 more Smart Citations