2015
DOI: 10.1007/978-3-319-20550-2_14
|View full text |Cite
|
Sign up to set email alerts
|

May I? - Content Security Policy Endorsement for Browser Extensions

Abstract: Abstract. Cross-site scripting (XSS) vulnerabilities are among the most prevailing problems on the web. Among the practically deployed countermeasures is a"defense-in-depth" Content Security Policy (CSP) to mitigate the e↵ects of XSS attacks. However, the adoption of CSP has been frustratingly slow. This paper focuses on a particular roadblock for wider adoption of CSP: its interplay with browser extensions. We report on a large-scale empirical study of all free extensions from Google's Chrome web store that u… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(14 citation statements)
references
References 12 publications
0
14
0
Order By: Relevance
“…Another paper by Hausknecht et al investigates the tension between browser extensions and CSP [11]. The authors conducted a large-scale study of browser extensions from the Chrome web store and found that many extensions tamper with the CSP of a page.…”
Section: Related Workmentioning
confidence: 97%
“…Another paper by Hausknecht et al investigates the tension between browser extensions and CSP [11]. The authors conducted a large-scale study of browser extensions from the Chrome web store and found that many extensions tamper with the CSP of a page.…”
Section: Related Workmentioning
confidence: 97%
“…Hausknecht, Magazinius and Sabelfeld [9] focused on the tension between content security policies and browser extensions. Since browser extensions can modify the DOM, they may end up making web pages request external resources which are not white-listed by the underlying content security policy.…”
Section: Other Work On Cspmentioning
confidence: 99%
“…Patil and Frederik found similar errors in their study [14]. Hausknecht et al [7] found that some browser extensions, modified the CSP policy headers, in order to whitelist more resources and origins. Van Acker et al [4] have shown that CSP fails at preventing data exfiltration specially when resources are prefetched, or in pres-ence of a CSP policy in the HTML meta tag, because the order in which resources are loaded in a web application is hard to predict.…”
Section: Related Workmentioning
confidence: 73%
“…Iframe sandboxing: Combining attribute allow-scripts and allow-same-origin as values for sandbox successfully 7 . We recommend the use of sandbox as a CSP directive, instead of an HTML iframe attribute.…”
Section: Avoiding Csp Violationsmentioning
confidence: 99%