2015
DOI: 10.1007/978-3-662-46669-8_21
|View full text |Cite
|
Sign up to set email alerts
|

Fine-Grained Detection of Privilege Escalation Attacks on Browser Extensions

Abstract: Even though their architecture relies on robust security principles, it is well-known that poor programming practices may expose browser extensions to serious security flaws, leading to privilege escalations by untrusted web pages or compromised extension components. We propose a formal security analysis of browser extensions in terms of a finegrained characterization of the privileges that an active opponent may escalate through the message passing interface and we discuss to which extent current programming … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 27 publications
0
8
0
Order By: Relevance
“…A core of λ-JS was also the language chosen by Calzavara et al [23] to design a sound static analysis to detect privilege escalation attacks on browser extensions, where malicious or compromised extension components abuse the message passing interface available to them to unduly gain access to securitysensitive functionalities. The static analysis was implemented in a prototype analyser for Google Chrome extensions, called CHEN.…”
Section: λ-Js and S5mentioning
confidence: 99%
“…A core of λ-JS was also the language chosen by Calzavara et al [23] to design a sound static analysis to detect privilege escalation attacks on browser extensions, where malicious or compromised extension components abuse the message passing interface available to them to unduly gain access to securitysensitive functionalities. The static analysis was implemented in a prototype analyser for Google Chrome extensions, called CHEN.…”
Section: λ-Js and S5mentioning
confidence: 99%
“…Due to their privileged position in browsers, it is well understood that extensions pose serious security and privacy threats to user data [7], [8], [9], [10], [11], [12], [13]. Therefore, in order to limit extensions capabilities, a mandatory permission system requires that extensions explicitly declare the set of APIs they effectively need to access.…”
Section: Introductionmentioning
confidence: 99%
“…Besides, a benign (non-malicious) extension can be buggy, allowing adversaries to exploit its vulnerabilities in order to get access to user sensitive data. One type of adversary that can exploit such vulnerabilities in extensions is the web attacker [9], [10], [13]. Indeed for security reasons, extensions and web applications execute in different and isolated contexts.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations