1. L. Liu, X. Zhang, G. Yan, S. Chen, Chrome extensions: threat analysis and countermeasures, in NDSS (2012)
2. Microsoft STRIDE threat model, https://msdn.microsoft.com/en-us/library/ee823878%28v=cs.20%29.aspx
3. S.F. Burns, Threat modeling: a process to ensure application security, in GIAC Security Essentials Certification (GSEC) Practical Assignment (2005)
4. N. Carlini, A. Porter Felt, D. Wagner, An evaluation of the google chrome extension security architecture, in Presented as Part of the 21st USENIX Security Symposium (USENIX Security 12), pp. 97–111 (2012)
5. V. Aravind, M. Sethumadhavan, A framework for analysing the security of chrome extensions. Adv. Comput. Netw. Inf. 2, 267–272 (2014)