Ill-intentioned browser extensions pose an emergent security risk and have become one of the most common attack vectors on the Internet due to their wide popularity and high privilege. Once installed, malicious extensions are executed and attempt to compromise a victim's browser. To detect malicious browser extensions, security researchers have put forward several techniques. These techniques primarily concentrate on the usage of API calls by malicious extensions, imposing restricted policies for extensions, and monitoring extension's activities. In this paper, we propose a machine-learning-based approach to detect malicious extensions. We apply static and dynamic techniques to analyse an extension for extracting features. The ana...
Abstract—A common characteristic of modern web browsers is that their functionality can be extended ...
Browser extensions enhance the functionality of native Web applications on the client side. They pro...
Even though their architecture relies on robust security principles, it is well-known that poor prog...
Ill-intentioned browser extensions pose an emergent security risk and have become one of the most co...
Browser extensions are popular small applications that allow users to enrich their browsing experien...
Unsafely coded browser extensions can compromise the security of a browser, making them attractive t...
Malicious webpages with JavaScript code that launch attacks on web browsers have become an increasin...
Browser extensions are popular web applications that users install in modern browsers to enrich the ...
A large number of extensions exist in browser vendors ’ on-line stores for millions of users to down...
We present Hulk, a dynamic analysis system that de-tects malicious behavior in browser extensions by...
JavaScript is a browser scripting language that allows developers to create sophisticated client-sid...
Since the dawn of the Internet, all of us have been swept up by the Niagara of information that fill...
Even though their architecture relies on robust security principles, it is well-known that poor prog...
Browser extensions boost the browsing experience by a range of features from automatic translation a...
Browser extensions provide a powerful platform to enrich browsing experience. At the same time, they...
Abstract—A common characteristic of modern web browsers is that their functionality can be extended ...
Browser extensions enhance the functionality of native Web applications on the client side. They pro...
Even though their architecture relies on robust security principles, it is well-known that poor prog...
Ill-intentioned browser extensions pose an emergent security risk and have become one of the most co...
Browser extensions are popular small applications that allow users to enrich their browsing experien...
Unsafely coded browser extensions can compromise the security of a browser, making them attractive t...
Malicious webpages with JavaScript code that launch attacks on web browsers have become an increasin...
Browser extensions are popular web applications that users install in modern browsers to enrich the ...
A large number of extensions exist in browser vendors ’ on-line stores for millions of users to down...
We present Hulk, a dynamic analysis system that de-tects malicious behavior in browser extensions by...
JavaScript is a browser scripting language that allows developers to create sophisticated client-sid...
Since the dawn of the Internet, all of us have been swept up by the Niagara of information that fill...
Even though their architecture relies on robust security principles, it is well-known that poor prog...
Browser extensions boost the browsing experience by a range of features from automatic translation a...
Browser extensions provide a powerful platform to enrich browsing experience. At the same time, they...
Abstract—A common characteristic of modern web browsers is that their functionality can be extended ...
Browser extensions enhance the functionality of native Web applications on the client side. They pro...
Even though their architecture relies on robust security principles, it is well-known that poor prog...