Publication:
After you, please: browser extensions order attacks and countermeasures

dc.affiliation.dptoUC3M. Departamento de Informáticaes
dc.affiliation.grupoinvUC3M. Grupo de Investigación: COSEC (Computer SECurity Lab)es
dc.contributor.authorPicazo Sánchez, Pablo
dc.contributor.authorEstévez Tapiador, Juan Manuel
dc.contributor.authorSchneider, Gerardo
dc.contributor.funderComunidad de Madrides
dc.contributor.funderEuropean Commissionen
dc.contributor.funderMinisterio de Economía y Competitividad (España)es
dc.date.accessioned2021-12-09T15:25:35Z
dc.date.available2021-12-09T15:25:35Z
dc.date.issued2020-12-01
dc.description.abstractBrowser extensions are small applications executed in the browser context that provide additional capabilities and enrich the user experience while surfing the web. The acceptance of extensions in current browsers is unquestionable. For instance, Chrome's official extension repository has more than 63,000 extensions, with some of them having more than 10M users. When installed, extensions are pushed into an internal queue within the browser. The order in which each extension executes depends on a number of factors, including their relative installation times. In this paper, we demonstrate how this order can be exploited by an unprivileged malicious extension (i.e., one with no more permissions than those already assigned when accessing web content) to get access to any private information that other extensions have previously introduced. We propose a solution that does not require modifying the core browser engine, since it is implemented as another browser extension. We prove that our approach effectively protects the user against usual attackers (i.e., any other installed extension) as well as against strong attackers having access to the effects of all installed extensions (i.e., knowing who did what). We also prove soundness and robustness of our approach under reasonable assumptions.en
dc.description.sponsorshipThis work was partially supported by the Swedish Research Council (Vetenskapsrådet) through the Grant PolUser (2015-04154), the Swedish funding agency SSF under the Grant Data Driven Secure Business Intelligence, the Spanish Government through MINECO Grant SMOG-DEV (TIN2016-79095-C2-2-R) and by the Comunidad de Madrid under the Grant CYNAMON (P2018/TCS-4566), co-financed by European Structural Funds (ESF and FEDER)en
dc.identifier.bibliographicCitationPicazo-Sanchez, P., Tapiador, J. & Schneider, G. After you, please: browser extensions order attacks and countermeasures. Int. J. Inf. Secur. 19, 623–638 (2020). https://doi.org/10.1007/s10207-019-00481-8e
dc.identifier.doihttps://doi.org/10.1007/s10207-019-00481-8
dc.identifier.issn1615-5262
dc.identifier.publicationfirstpage623
dc.identifier.publicationlastpage638
dc.identifier.publicationtitleInternational Journal of Information Securityen
dc.identifier.publicationvolume19
dc.identifier.urihttps://hdl.handle.net/10016/33729
dc.identifier.uxxiAR/0000025985
dc.language.isoengen
dc.publisherSpringeren
dc.relation.projectIDGobierno de España. TIN2016-79095-C2-2-Res
dc.relation.projectIDComunidad de Madrid. P2018/TCS-4566-CMes
dc.rights© The Author(s) 2019en
dc.rightsAtribución 3.0 España
dc.rights.accessRightsopen accessen
dc.rights.urihttp://creativecommons.org/licenses/by/3.0/es/en
dc.subject.ecienciaInformáticaes
dc.subject.otherweb securityen
dc.subject.otherprivacyen
dc.subject.otherbrowser extensionsen
dc.subject.othermalwareen
dc.subject.otherchromeen
dc.titleAfter you, please: browser extensions order attacks and countermeasuresen
dc.typeresearch article*
dc.type.hasVersionVoR*
dspace.entity.typePublication
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
afteryou_IJIS_2020.pdf
Size:
1.36 MB
Format:
Adobe Portable Document Format
Description: