Title
Extension Breakdown: Security Analysis Of Browsers Extension Resources Control Policies
Abstract
All major web browsers support browser extensions to add new features and extend their functionalities. Nevertheless, browser extensions have been the target of several attacks due to their tight relation with the browser environment. As a consequence, extensions have been abused in the past for malicious tasks such as private information gathering, browsing history retrieval, or passwords theft - leading to a number of severe targeted attacks.Even though no protection techniques existed in the past to secure extensions, all browsers now implement defensive countermeasures that, in theory, protect extensions and their resources from third party access. In this paper, we present two attacks that bypass these control techniques in every major browser family, enabling enumeration attacks against the list of installed extensions. In particular, we present a timing side-channel attack against the access control settings and an attack that takes advantage of poor programming practice, affecting a large number of Safari extensions. Due to the harmful nature of our findings, we also discuss possible countermeasures against our own attacks and reported our findings and countermeasures to the different actors involved. We believe that our study can help secure current implementations and help developers to avoid similar attacks in the future.
Year
Venue
Field
2017
PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17)
World Wide Web,Computer science,Computer security,Security analysis
DocType
Citations 
PageRank 
Conference
7
0.51
References 
Authors
0
3
Name
Order
Citations
PageRank
Iskander Sánchez-Rola1254.03
Igor Santos266445.73
Davide Balzarotti32040113.64