Experimental Security Analysis of Sensitive Data Access by Browser Extensions
Abstract
Supplemental Material
- Download
- 1454.47 MB
- Download
- 158.76 MB
References
Index Terms
- Experimental Security Analysis of Sensitive Data Access by Browser Extensions
Recommendations
Hardening the security analysis of browser extensions
SAC '22: Proceedings of the 37th ACM/SIGAPP Symposium on Applied ComputingBrowser extensions boost the browsing experience by a range of features from automatic translation and grammar correction to password management, ad blocking, and remote desktops. Yet the power of extensions poses significant privacy and security ...
Discovering Browser Extensions via Web Accessible Resources
CODASPY '17: Proceedings of the Seventh ACM on Conference on Data and Application Security and PrivacyBrowser extensions provide a powerful platform to enrich browsing experience. At the same time, they raise important security questions. From the point of view of a website, some browser extensions are invasive, removing intended features and adding ...
After you, please: browser extensions order attacks and countermeasures
AbstractBrowser extensions are small applications executed in the browser context that provide additional capabilities and enrich the user experience while surfing the web. The acceptance of extensions in current browsers is unquestionable. For instance, ...
Comments
Information & Contributors
Information
Published In

- General Chairs:
- Tat-Seng Chua,
- Chong-Wah Ngo,
- Proceedings Chair:
- Roy Ka-Wei Lee,
- Program Chairs:
- Ravi Kumar,
- Hady W. Lauw
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 564Total Downloads
- Downloads (Last 12 months)564
- Downloads (Last 6 weeks)68
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in