A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023‏ - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

Doublex: Statically detecting vulnerable data flows in browser extensions at scale

A Fass, DF Somé, M Backes, B Stock - Proceedings of the 2021 ACM …, 2021‏ - dl.acm.org
Browser extensions are popular to enhance users' browsing experience. By design, they
have access to security-and privacy-critical APIs to perform tasks that web applications …

Defending novice user privacy: An evaluation of default web browser configurations

K Radivojevic, N Clark, A Klempay, P Brenner - Computers & Security, 2024‏ - Elsevier
Cyber novices often enter sensitive data into web browsers for routine activities such as
online shop** and bill payments, making them targets for malicious entities, including …

CoCo: Efficient Browser Extension Vulnerability Detection via Coverage-guided, Concurrent Abstract Interpretation

J Yu, S Li, J Zhu, Y Cao - Proceedings of the 2023 ACM SIGSAC …, 2023‏ - dl.acm.org
Extensions complement web browsers with additional functionalities and also bring new
vulnerability venues, allowing privilege escalations from adversarial web pages to use …

{FV8}: A Forced Execution {JavaScript} Engine for Detecting Evasive Techniques

N Pantelaios, A Kapravelos - 33rd USENIX Security Symposium …, 2024‏ - usenix.org
Evasion techniques allow malicious code to never be observed. This impacts significantly
the detection capabilities of tools that rely on either dynamic or static analysis, as they never …

Hardening the security analysis of browser extensions

B Eriksson, P Picazo-Sanchez… - Proceedings of the 37th …, 2022‏ - dl.acm.org
Browser extensions boost the browsing experience by a range of features from automatic
translation and grammar correction to password management, ad blocking, and remote …

A Holistic Review on Detection of Malicious Browser Extensions and Links using Deep Learning

T Zonta, M Sathiyanarayanan - 2024 IEEE 3rd International …, 2024‏ - ieeexplore.ieee.org
The growth of the Internet has aroused people's attention toward network security. A secure
network environment is fundamental for the expeditious and impeccable development of the …

Towards Browser Controls to Protect Cookies from Malicious Extensions

L Tyler, IDO Nunes - arxiv preprint arxiv:2405.06830, 2024‏ - arxiv.org
Cookies maintain state across related web traffic. As such, cookies are commonly used for
authentication by storing a user's session ID and replacing the need to re-enter credentials …

Understanding and mitigating remote code execution vulnerabilities in cross-platform ecosystem

F **ao, Z Yang, J Allen, G Yang, G Williams… - Proceedings of the 2022 …, 2022‏ - dl.acm.org
JavaScript cross-platform frameworks are becoming increasingly popular. They help
developers easily and conveniently build cross-platform applications while just needing only …

On measuring vulnerable javascript functions in the wild

M Kluban, M Mannan, A Youssef - Proceedings of the 2022 ACM on …, 2022‏ - dl.acm.org
JavaScript is often rated as the most popular programming language for the development of
both client-side and server-side applications, and is currently used in almost all websites …