Extended Tracking Powers: Measuring the Privacy Diffusion Enabled by Browser Extensions
نویسندگان
چکیده
Users have come to rely on browser extensions to realize features that are not implemented by browser vendors. Extensions offer users the ability to, among others, block ads, de-clutter websites, enrich pages with third-party content, and take screenshots. At the same time, because of their privileged position inside a user’s browser, extensions have access to content and functionality that is not available to webpages, such as, the ability to conduct and read crossorigin requests, as well as get access to a browser’s history and cookie jar. In this paper, we report on the first large-scale study of privacy leakage enabled by extensions. By using dynamic analysis and simulated user interactions, we investigate the leaking happening by the 10,000 most popular browser extensions of Google Chrome and find that a non-negligible fraction leaks sensitive information about the user’s browsing habits, such as, their browsing history and search-engine queries. We identify common ways that extensions use to obfuscate this leakage and discover that, while some leakage happens on purpose, a large fraction of it is accidental because of the way that extensions attempt to introduce thirdparty content to a page’s DOM. To counter the inference of a user’s interests and private information enabled by this leakage, we design, implement, and evaluate BrowsingFog, a browser extension that automatically browses the web in a way that conceals a user’s true interests, from a vantage point of history-stealing, third-party trackers.
منابع مشابه
These Browser Extensions Spy on 8 Million Users
This work investigates the upalytics.com library for Chrome and Firefox extensions, which performs real time tracking of users on all sites they visit. The code is bundled with free extensions in the official extension stores, exfiltrating browsing history as a feature. Within the top 7,000 Chrome extensions, the library is used 42 times with over 8 million installations, the most widely used o...
متن کاملThe Case for a General and Interaction-based Third-party Cookie Policy
The privacy implications of third-party tracking is a well-studied problem. Recent research has shown that besides data aggregators and behavioral advertisers, online social networks also act as trackers via social widgets. Existing cookie policies are not enough to solve these problems, pushing users to employ blacklist-based browser extensions to prevent such tracking. Unfortunately, such app...
متن کاملThe Most Dangerous Code in the Browser
Browser extensions are ubiquitous. Yet, in today’s browsers, extensions are the most dangerous code to user privacy. Extensions are third-party code, like web applications, but run with elevated privileges. Even worse, existing browser extension systems give users a false sense of security by considering extensions to be more trustworthy than web applications. This is because the user typically...
متن کاملDefacement of Colluding Attack Using Blowfish Algorithm
Abstract In web environment, browser extension extends its functionality by retrieving, presenting and traversing the information through web browser. Browser extensions run with ‘high’ privileges which consequences, vulnerable web browser extensions to steal user’s credentials and trap users into leaking sensitive information to unauthorized parties. One of the attack known as Colluding browse...
متن کاملDesigning Path for Robot Arm Extensions Series with the Aim of Avoiding Obstruction with Recurring Neural Network
In this paper, recurrent neural network is used for path planning in the joint space of the robot with obstacle in the workspace of the robot. To design the neural network, first a performance index has been defined as sum of square of error tracking of final executor. Then, obstacle avoidance scheme is presented based on its space coordinate and its minimum distance between the obstacle and ea...
متن کامل