No Signal Left to Chance: Driving Browser Extension Analysis by Download Patterns
Abstract
References
Index Terms
- No Signal Left to Chance: Driving Browser Extension Analysis by Download Patterns
Recommendations
Hardening the security analysis of browser extensions
SAC '22: Proceedings of the 37th ACM/SIGAPP Symposium on Applied ComputingBrowser extensions boost the browsing experience by a range of features from automatic translation and grammar correction to password management, ad blocking, and remote desktops. Yet the power of extensions poses significant privacy and security ...
Discovering Browser Extensions via Web Accessible Resources
CODASPY '17: Proceedings of the Seventh ACM on Conference on Data and Application Security and PrivacyBrowser extensions provide a powerful platform to enrich browsing experience. At the same time, they raise important security questions. From the point of view of a website, some browser extensions are invasive, removing intended features and adding ...
Effective detection of vulnerable and malicious browser extensions
Unsafely coded browser extensions can compromise the security of a browser, making them attractive targets for attackers as a primary vehicle for conducting cyber-attacks. Among others, the three factors making vulnerable extensions a high-risk security ...
Comments
Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 493Total Downloads
- Downloads (Last 12 months)278
- Downloads (Last 6 weeks)27
Other Metrics
Citations
Cited By
View allView Options
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML FormatLogin options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in