TY - GEN
T1 - Memoirs of a Browser: A Cross-browser Detection Model for Privacy-breaching Extensions
AU - Giuffrida, C.
AU - Ortolani, S.
AU - Crispo, B.
PY - 2012
Y1 - 2012
N2 - Web browsers are undoubtedly one of the most popular user applications. This is even more evident in recent times, with Google introducing a platform where the browser is the only application provided to the user. With their modular and extensible architecture, modern browsers are also an appealing platforms for third-party software developers, who can easily publish new extensions to extend any standard web browser functionality. Extendability is a crucial feature that makes web browsers a very attractive service platform. From a security perspective, however, extensions opened up new opportunities for attacks. Most extensions do not require any special privilege to be installed, despite their ability to access all the user private data. Delegating the decision about extension's security to trusted parties is not a conclusive solution, given that privacy-breaching behavior has been found even in store-approved extensions.
AB - Web browsers are undoubtedly one of the most popular user applications. This is even more evident in recent times, with Google introducing a platform where the browser is the only application provided to the user. With their modular and extensible architecture, modern browsers are also an appealing platforms for third-party software developers, who can easily publish new extensions to extend any standard web browser functionality. Extendability is a crucial feature that makes web browsers a very attractive service platform. From a security perspective, however, extensions opened up new opportunities for attacks. Most extensions do not require any special privilege to be installed, despite their ability to access all the user private data. Delegating the decision about extension's security to trusted parties is not a conclusive solution, given that privacy-breaching behavior has been found even in store-approved extensions.
UR - https://www.scopus.com/pages/publications/84871975712
UR - https://www.scopus.com/inward/citedby.url?scp=84871975712&partnerID=8YFLogxK
U2 - 10.1145/2414456.2414461
DO - 10.1145/2414456.2414461
M3 - Conference contribution
SP - 10
EP - 11
BT - Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
PB - ACM
ER -