منابع مشابه
Browser forensics: adblocker extensions
The purpose of this research is to identify artifacts that are left behind by adblocking extensions. First their mechanics are explored, which includes a source code study of the two most used adblocking extesions, AdBlock and Adblock Plus. Then, samples are gathered by browsing to the top 50 websites of the Netherlands, without and with an adblocker extension installed. The same is done for ru...
متن کاملLeast Privilege for Browser Extensions
Browser extensions let developers add extra functionality to the browser. Although this enables popular new features, extensions threaten browser security because they are written by unknown third-party developers. An extension could be directly malicious, or a well-intentioned developer could write buggy code that leaks privileges to a malicious web site operator. This thesis advocates the dev...
متن کاملHulk: Eliciting Malicious Behavior in Browser Extensions
We present Hulk, a dynamic analysis system that detects malicious behavior in browser extensions by monitoring their execution and corresponding network activity. Hulk elicits malicious behavior in extensions in two ways. First, Hulk leverages HoneyPages, which are dynamic pages that adapt to an extension’s expectations in web page structure and content. Second, Hulk employs a fuzzer to drive t...
متن کاملStronger Password Authentication Using Browser Extensions
We describe a browser extension, PwdHash, that transparently produces a different password for each site, improving web password security and defending against password phishing and other attacks. Since the browser extension applies a cryptographic hash function to a combination of the plaintext password entered by the user, data associated with the web site, and (optionally) a private salt sto...
متن کاملA Security Analysis of Browser Extensions
Browser Extensions (often called plugins or addons) are small pieces of code that let developers add additional functionality to the browser. However, with extensions comes a security price: the user must trust the developer. We look at ways in which this trust can be broken and malicious extensions installed. We also look at silent installations of plugins in various browsers and work on ways ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Serials Review
سال: 2019
ISSN: 0098-7913,1879-095X
DOI: 10.1080/00987913.2019.1624909