Spying on the browser: Dissecting the design of malicious extensions

被引:1
|
作者
Sood A.K. [1 ]
Enbody R.J. [1 ]
机构
[1] Michigan State University, United States
关键词
D O I
10.1016/S1353-4858(11)70050-2
中图分类号
学科分类号
摘要
Browsers are a vital component of every computer system as they serve as the interface to the Internet. However, the extensible nature of browsers has facilitated the proliferation of malware infections. In this article, we examine the design of malicious extensions used to steal information from browsers in order to conduct illegal transactions. The focus is on Mozilla's Firefox - but other browsers that share these characteristics will also share similar vulnerabilities. © 2011 Elsevier Ltd.
引用
收藏
页码:8 / 12
页数:4
相关论文
共 50 条
  • [1] Detecting Spying and Fraud Browser Extensions
    Varshney, Gaurav
    Misra, Manoj
    Atrey, Pradeep K.
    PROCEEDINGS OF THE 2017 WORKSHOP ON MULTIMEDIA PRIVACY AND SECURITY (MPS'17), 2017, : 45 - 52
  • [2] Botnet in the Browser: Understanding Threats Caused by Malicious Browser Extensions
    Perrotta, Raffaello
    Hao, Feng
    IEEE SECURITY & PRIVACY, 2018, 16 (04) : 66 - 81
  • [3] Hulk: Eliciting Malicious Behavior in Browser Extensions
    Kapravelos, Alexandros
    Grier, Chris
    Chachra, Neha
    Kruegel, Christopher
    Vigna, Giovanni
    Paxson, Vern
    PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, 2014, : 641 - 654
  • [4] Effective detection of vulnerable and malicious browser extensions
    Shahriar, Hossain
    Weldemariam, Komminist
    Zulkernine, Mohammad
    Lutellier, Thibaud
    COMPUTERS & SECURITY, 2014, 47 : 66 - 84
  • [5] Man-in-the-browser Attack: A Case Study on Malicious Browser Extensions
    Rauti, Sampsa
    Communications in Computer and Information Science, 2020, 1208 CCIS : 60 - 71
  • [6] Cookie Based Protocol to Defend Malicious Browser Extensions
    Joseph, Justin
    Bhadauria, Saumya
    2019 IEEE 53RD INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST 2019), 2019,
  • [7] Characterizing Cryptocurrency-themed Malicious Browser Extensions
    Wang K.
    Ling Y.
    Zhang Y.
    Yu Z.
    Wang H.
    Bai G.
    Ooi B.C.
    Dong J.S.
    Performance Evaluation Review, 2023, 51 (01): : 91 - 92
  • [8] Characterizing Cryptocurrency-themed Malicious Browser Extensions
    Wang, Kailong
    Ling, Yuxi
    Zhang, Yanjun
    Yu, Zhou
    Wang, Haoyu
    Bai, Guangdong
    Ooi, Beng Chin
    Dong, Jin Song
    PROCEEDINGS OF THE ACM ON MEASUREMENT AND ANALYSIS OF COMPUTING SYSTEMS, 2022, 6 (03)
  • [9] A Model-Based Detection of Vulnerable and Malicious Browser Extensions
    Shahriar, Hossain
    Weldemariam, Komminist
    Lutellier, Thibaud
    Zulkernine, Mohammad
    2013 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY (SERE), 2013, : 198 - 207
  • [10] I Spy with My Little Eye: Analysis and Detection of Spying Browser Extensions
    Aggarwal, Anupama
    Viswanath, Bimal
    Zhang, Liang
    Kumar, Saravana
    Shah, Ayush
    Kumaraguru, Ponnurangam
    2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2018), 2018, : 47 - 61