Proceedings 2019 Network and Distributed System Security Symposium 2019
DOI: 10.14722/ndss.2019.23309
|View full text |Cite
|
Sign up to set email alerts
|

Latex Gloves: Protecting Browser Extensions from Probing and Revelation Attacks

Abstract: Browser extensions enable rich experience for the users of today's web. Being deployed with elevated privileges, extensions are given the power to overrule web pages. As a result, web pages often seek to detect the installed extensions, sometimes for benign adoption of their behavior but sometimes as part of privacy-violating user fingerprinting. Researchers have studied a class of attacks that allow detecting extensions by probing for Web Accessible Resources (WARs) via URLs that include public extension IDs.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 15 publications
(10 citation statements)
references
References 10 publications
0
10
0
Order By: Relevance
“…As demonstrated by our experimental evaluation, the countermeasure proposed by Trickel et al [55] is ineffective against the vast majority of our behavioral fingerprints. Two other studies [46], [50] recently proposed whitelist-based countermeasures for mediating access between extensions and web pages, and a similar approach has been announced by Chrome [6]. These mechanisms can potentially reduce the fingerprint surface exposed to certain domains, but the ones that users whitelist will still be able to run the attacks we demonstrated.…”
Section: Discussion and Future Workmentioning
confidence: 81%
See 3 more Smart Citations
“…As demonstrated by our experimental evaluation, the countermeasure proposed by Trickel et al [55] is ineffective against the vast majority of our behavioral fingerprints. Two other studies [46], [50] recently proposed whitelist-based countermeasures for mediating access between extensions and web pages, and a similar approach has been announced by Chrome [6]. These mechanisms can potentially reduce the fingerprint surface exposed to certain domains, but the ones that users whitelist will still be able to run the attacks we demonstrated.…”
Section: Discussion and Future Workmentioning
confidence: 81%
“…As mentioned previously, prior studies have demonstrated the feasibility of browser extension enumeration and fingerprintability. These studies focused their efforts on identifying extensions that expose specific resources (i.e., WAR-based enumeration) either directly [24], [47] or with clever implicit approaches [44], [46]. In the following subsections we provide technical details and outline the fingerprint generation and extension detection process for our four techniques.…”
Section: System Design and Implementationmentioning
confidence: 99%
See 2 more Smart Citations
“…Additionally, our scenario can handle situations where, two browser extensions developed by the same person or company but placed for instance at the beginning and at the end of the execution queue will actually access to different information and thus, collaborate to perform attacks like browser hijacking [19,13], or fingerprinting [15,10] attacks.…”
Section: Attacker Modelmentioning
confidence: 99%