This paper is the first attempt at providing a holistic view of the Chrome Web Store (CWS). We leverage historical data provided by ChromeStats to study global trends in the CWS and security implications. We first highlight the extremely short life cycles of extensions: roughly 60% of extensions stay in the CWS for one year. Second, we define and show that Security-Noteworthy Extensions (SNE) are a significant issue: they pervade the CWS for years and affect almost 350 million users. Third, we identify clusters of extensions with a similar code base. We discuss how code similarity techniques could be used to flag suspicious extensions. By developing an approach to extract URLs from extensions' comments, we show that extensions reuse code sn...
Browser extensions are popular web applications that users install in modern browsers to enrich the ...
Client-side attacks against web sessions are a real concern for many applications. Realizing protect...
Web browsers are undoubtedly one of the most popular user applications. This is even more evident in...
Abstract—A common characteristic of modern web browsers is that their functionality can be extended ...
Web browsers have become the predominant means for developing and deploying applications, and thus t...
Browser extensions boost the browsing experience by a range of features from automatic translation a...
Browser extensions enhance the functionality of native Web applications on the client side. They pro...
Cross-site scripting (XSS) vulnerabilities are among the most prevailing problems on the web. Among ...
Abstract. Cross-site scripting (XSS) vulnerabilities are among the most prevailing problems on the w...
Browser extensions provide a powerful platform to enrich browsing experience. At the same time, they...
The widely popular browser extensions now become one of the most commonly used malware attack vector...
Browser extensions are popular small applications that allow users to enrich their browsing experien...
Browser extensions are small applications executed in the browser context that provide additional ca...
Even though their architecture relies on robust security principles, it is well-known that poor prog...
Abstract—Web browser security is lacking and browsers are often unable to detect what is unwanted tr...
Browser extensions are popular web applications that users install in modern browsers to enrich the ...
Client-side attacks against web sessions are a real concern for many applications. Realizing protect...
Web browsers are undoubtedly one of the most popular user applications. This is even more evident in...
Abstract—A common characteristic of modern web browsers is that their functionality can be extended ...
Web browsers have become the predominant means for developing and deploying applications, and thus t...
Browser extensions boost the browsing experience by a range of features from automatic translation a...
Browser extensions enhance the functionality of native Web applications on the client side. They pro...
Cross-site scripting (XSS) vulnerabilities are among the most prevailing problems on the web. Among ...
Abstract. Cross-site scripting (XSS) vulnerabilities are among the most prevailing problems on the w...
Browser extensions provide a powerful platform to enrich browsing experience. At the same time, they...
The widely popular browser extensions now become one of the most commonly used malware attack vector...
Browser extensions are popular small applications that allow users to enrich their browsing experien...
Browser extensions are small applications executed in the browser context that provide additional ca...
Even though their architecture relies on robust security principles, it is well-known that poor prog...
Abstract—Web browser security is lacking and browsers are often unable to detect what is unwanted tr...
Browser extensions are popular web applications that users install in modern browsers to enrich the ...
Client-side attacks against web sessions are a real concern for many applications. Realizing protect...
Web browsers are undoubtedly one of the most popular user applications. This is even more evident in...