Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security 2020
DOI: 10.1145/3372297.3423343
|View full text |Cite
|
Sign up to set email alerts
|

You've Changed: Detecting Malicious Browser Extensions through their Update Deltas

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(12 citation statements)
references
References 14 publications
0
8
0
Order By: Relevance
“…Researchers have gathered evidence of online services data collection behaviors via longitudinal measurements across various platforms [34,17,1,42,31,48,44,30]. Analysis of mobile apps showed sensitive data, including PII [44], is collected and shared with third parties without user consent [31].…”
Section: Background and Related Workmentioning
confidence: 99%
“…Researchers have gathered evidence of online services data collection behaviors via longitudinal measurements across various platforms [34,17,1,42,31,48,44,30]. Analysis of mobile apps showed sensitive data, including PII [44], is collected and shared with third parties without user consent [31].…”
Section: Background and Related Workmentioning
confidence: 99%
“…Next, security patches were identified so the code before and after patching could be collected, which generated an abstract vulnerability and corresponding patch signature. Compared to the sensor data collection method in Pantelaios et al (2020), approved collaborators produced the data instead of the public that is nonapproved and is not likely to have significant quality fluctuations.…”
Section: Literature Reviewmentioning
confidence: 99%
“…This could decrease the performance of trained models over time or allow models to detect only a specific type of malicious behavior. The work of (Hara & Shiomoto, 2020) showed that a small percentage of traditional labeled data gave comparable accuracy to those adversarial generated (Hara & Shiomoto, 2020). This could indicate the labeled data follows a distribution, leading to the model becoming vulnerable to adversarial attacks. Live data collection is used to collect up‐to‐date observations over time to curate a suitable dataset to evaluate longitudinal performance, which would otherwise not be possible with traditional datasets (Ah‐Fat et al, 2020; Lin & Liu, 2021; Oest et al, 2020; Pantelaios et al, 2020; Rendall et al, 2020). This can prevent outdated trends from becoming used in training and demonstrate long‐term performance, which is crucial for real‐world deployment. The conduction of attack campaigns and data capture allowed the evaluation of throughput and computational resources, such as memory and CPU consumption (P. Gao et al, 2018; X. Han et al, 2020).…”
Section: Literature Reviewmentioning
confidence: 99%
“…However, we observe that it is still possible for an attacker to hide malicious operations of an extension behind an innocuous functionality, trigger them at certain events or dynamically load the code at runtime and thus, could be successfully uploaded on the store, bypassing the security measures in place. Recently, Pantelaios et al [26] also showed that an extension could initially constitute benign functionalities and can later turn malicious by receiving updates, thus bypassing the initial screening. Hence, it is imperative to have an added line-of-defense at runtime to monitor and defend against such a specific class of attacks.…”
Section: Security Architecture Of Extensionsmentioning
confidence: 99%
“…Previous large-scale studies by various researchers indicate that they often spy on user browsing history, steals privacy-sensitive user information, or illegitimately modifies the content of Web pages [2,14,25,31]. Recent studies further assert that these man-in-the-browser entities are persistently abused in the wild and may have grave implications [26,27,32]. While these studies indicate that the extensions often intercept and modify the security headers at runtime, we emphasize that a systematic investigation is essential to determine, categorize and quantify the threats associated with them and propose effective countermeasures to tackle these vulnerabilities.…”
Section: Introductionmentioning
confidence: 99%