Analyzing the dangers posed by Chrome Extensions

A common characteristic of modern web browsers is that their functionality can be extended via third-party addons. In this paper we focus on Chrome extensions, to which the Chrome browser exports a rich API: extensions can potentially make network requests, access the local file system, get low-leve...

Full description

Saved in:
Bibliographic Details
Main Authors: BAUER, Lujo, CAI, Shaoying, JIA, Limin, PASSARO, Timothy, TIAN, Yuan
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2014
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/4193
https://ink.library.smu.edu.sg/context/sis_research/article/5196/viewcontent/cns2014_browserattacks.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-5196
record_format dspace
spelling sg-smu-ink.sis_research-51962018-12-13T09:26:22Z Analyzing the dangers posed by Chrome Extensions BAUER, Lujo CAI, Shaoying JIA, Limin PASSARO, Timothy TIAN, Yuan A common characteristic of modern web browsers is that their functionality can be extended via third-party addons. In this paper we focus on Chrome extensions, to which the Chrome browser exports a rich API: extensions can potentially make network requests, access the local file system, get low-level information about running processes, etc. To guard against misuse, Chrome uses a permission system to curtail an extension's privileges. We demonstrate a series of attacks by which extensions can steal data, track user behavior, and collude to elevate their privileges. Although some attacks have previously been reported, we show that subtler versions can easily be devised that are less likely to be prevented by proposed defenses and can evade notice by the user. We quantify the potential danger of attacks by examining how many currently available extensions have sufficient privileges to carry them out. As many web sites do not employ defenses against such attacks, we examine how many popular web sites are vulnerable to each kind of attack. Our results show that a surprisingly large fraction of web sites is vulnerable to many attacks, and a large fraction of currently available extensions is potentially able to carry them out. 2014-10-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/4193 info:doi/10.1109/CNS.2014.6997485 https://ink.library.smu.edu.sg/context/sis_research/article/5196/viewcontent/cns2014_browserattacks.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Information Security
spellingShingle Information Security
BAUER, Lujo
CAI, Shaoying
JIA, Limin
PASSARO, Timothy
TIAN, Yuan
Analyzing the dangers posed by Chrome Extensions
description A common characteristic of modern web browsers is that their functionality can be extended via third-party addons. In this paper we focus on Chrome extensions, to which the Chrome browser exports a rich API: extensions can potentially make network requests, access the local file system, get low-level information about running processes, etc. To guard against misuse, Chrome uses a permission system to curtail an extension's privileges. We demonstrate a series of attacks by which extensions can steal data, track user behavior, and collude to elevate their privileges. Although some attacks have previously been reported, we show that subtler versions can easily be devised that are less likely to be prevented by proposed defenses and can evade notice by the user. We quantify the potential danger of attacks by examining how many currently available extensions have sufficient privileges to carry them out. As many web sites do not employ defenses against such attacks, we examine how many popular web sites are vulnerable to each kind of attack. Our results show that a surprisingly large fraction of web sites is vulnerable to many attacks, and a large fraction of currently available extensions is potentially able to carry them out.
format text
author BAUER, Lujo
CAI, Shaoying
JIA, Limin
PASSARO, Timothy
TIAN, Yuan
author_facet BAUER, Lujo
CAI, Shaoying
JIA, Limin
PASSARO, Timothy
TIAN, Yuan
author_sort BAUER, Lujo
title Analyzing the dangers posed by Chrome Extensions
title_short Analyzing the dangers posed by Chrome Extensions
title_full Analyzing the dangers posed by Chrome Extensions
title_fullStr Analyzing the dangers posed by Chrome Extensions
title_full_unstemmed Analyzing the dangers posed by Chrome Extensions
title_sort analyzing the dangers posed by chrome extensions
publisher Institutional Knowledge at Singapore Management University
publishDate 2014
url https://ink.library.smu.edu.sg/sis_research/4193
https://ink.library.smu.edu.sg/context/sis_research/article/5196/viewcontent/cns2014_browserattacks.pdf
_version_ 1770574424741773312