After You, Please: Browser Extensions Order Attacks and Countermeasures

08/06/2019
by   Pablo Picazo-Sanchez, et al.
0

Browser extensions are small applications executed in the browser context that provide additional capabilities and enrich the user experience while surfing the web. The acceptance of extensions in current browsers is unquestionable. For instance, Chrome's official extension repository has more than 63,000 extensions, with some of them having more than 10M users. When installed, extensions are pushed into an internal queue within the browser. The order in which each extension executes depends on a number of factors, including their relative installation times. In this paper, we demonstrate how this order can be exploited by an unprivileged malicious extension (i.e., one with no more permissions than those already assigned when accessing web content) to get access to any private information that other extensions have previously introduced. Our solution does not require modifying the core browser engine as it is implemented as another browser extension. We prove that our approach effectively protects the user against usual attackers (i.e., any other installed extension) as well as against strong attackers having access to the effects of all installed extensions (i.e., knowing who did what). We also prove soundness and robustness of our approach under reasonable assumptions.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/10/2019

EmPoWeb: Empowering Web Applications with Browser Extensions

Browser extensions are third party programs, tightly integrated to brows...
research
08/06/2023

A Security and Usability Analysis of Local Attacks Against FIDO2

The FIDO2 protocol aims to strengthen or replace password authentication...
research
05/30/2019

DOMtegrity: Ensuring Web Page Integrity against Malicious Browser Extensions

In this paper, we address an unsolved problem in the real world: how to ...
research
11/02/2018

Identifying Extension-based Ad Injection via Fine-grained Web Content Provenance

Extensions provide useful additional functionality for web browsers, but...
research
01/10/2020

Understanding and Mitigating the Security Risks of Content Inclusion in Web Browsers

Thanks to the wide range of features offered by web browsers, modern web...
research
02/05/2021

Over 100 Bugs in a Row: Security Analysis of the Top-Rated Joomla Extensions

Nearly every second website is using a Content Management System (CMS) s...
research
03/27/2019

The Semantic Web Rule Language Expressiveness Extensions-A Survey

The Semantic Web Rule Language (SWRL) is a direct extension of OWL 2 DL ...

Please sign up or login with your details

Forgot password? Click here to reset