Affiliation:
1. University of Illinois at Urbana, Champaign
Abstract
The browser has become the de facto platform for everyday computation and a popular target for attackers of computer systems. Among the many potential attacks that target or exploit browsers, vulnerabilities in browser extensions have received relatively little attention. Currently, extensions are vetted by manual inspection, which is time consuming and subject to human error. In this paper, we present VEX, a framework for applying static information flow analysis to JavaScript code to identify security vulnerabilities in browser extensions. We describe several patterns of flows that can lead to privilege escalations in Firefox extensions. VEX analyzes Firefox extensions for such flow patterns using high-precision, context-sensitive, flow-sensitive static analysis. We subject 2460 browser extensions to the analysis, and VEX finds 5 of the 18 previously known vulnerabilities and 7 previously unknown vulnerabilities.
Funder
Office of Naval Research
Air Force Office of Scientific Research
National Science Foundation
Division of Computer and Network Systems
Publisher
Association for Computing Machinery (ACM)
Cited by
50 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Extent of spending behavior, problems encountered, and financial knowledge across generational cohorts among state universities and colleges employees;International Journal of ADVANCED AND APPLIED SCIENCES;2024-02
2. npm-follower: A Complete Dataset Tracking the NPM Ecosystem;Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering;2023-11-30
3. Wemint:Tainting Sensitive Data Leaks in WeChat Mini-Programs;2023 38th IEEE/ACM International Conference on Automated Software Engineering (ASE);2023-09-11
4. FProbe: The Flow-Centric Detection and a Large-Scale Measurement of Browser Fingerprinting;2023 32nd International Conference on Computer Communications and Networks (ICCCN);2023-07
5. From Manifest V2 to V3: A Study on the Discoverability of Chrome Extensions;Lecture Notes in Computer Science;2023