Towards Browser Controls to Protect Cookies from Malicious Extensions

L Tyler, IDO Nunes - arxiv preprint arxiv:2405.06830, 2024 - arxiv.org
Cookies maintain state across related web traffic. As such, cookies are commonly used for
authentication by storing a user's session ID and replacing the need to re-enter credentials …

What is in the Chrome Web Store?

S Hsu, M Tran, A Fass - Proceedings of the 19th ACM Asia Conference …, 2024 - dl.acm.org
This paper is the first attempt at providing a holistic view of the Chrome Web Store (CWS).
We leverage historical data provided by ChromeStats to study global trends in the CWS and …

Efficient static vulnerability analysis for javascript with multiversion dependency graphs

M Ferreira, M Monteiro, T Brito, ME Coimbra… - Proceedings of the …, 2024 - dl.acm.org
While static analysis tools that rely on Code Property Graphs (CPGs) to detect security
vulnerabilities have proven effective, deciding how much information to include in the …

A Machine Learning Driven Website Platform and Browser Extension for Real-time Scoring and Fraud Detection for Website Legitimacy Verification and Consumer …

MKH Chy, ON Buadi - arxiv preprint arxiv:2411.00368, 2024 - arxiv.org
This paper introduces a Machine Learning-Driven website Platform and Browser Extension
designed to quickly enhance online security by providing real-time risk scoring and fraud …

FakeX: A Framework for Detecting Fake Reviews of Browser Extensions

E Olsson, B Eriksson, P Picazo-Sanchez… - Proceedings of the 19th …, 2024 - dl.acm.org
Browser extensions boost user experience on the web. Similarly to smartphone app stores,
browsers like Chrome distribute browser extensions via their Web Store, enabling a thriving …

ReactAppScan: Mining React Application Vulnerabilities via Component Graph

Z Guo, M Kang, VN Venkatakrishnan… - Proceedings of the …, 2024 - dl.acm.org
React, a single-page application framework, has recently become popular among web
developers due to its flexible and convenient management of web application states via a …

Peeking through the window: Fingerprinting Browser Extensions through Page-Visible Execution Traces and Interactions

S Agarwal, A Fass, B Stock - Proceedings of the 2024 on ACM SIGSAC …, 2024 - dl.acm.org
Browser extensions are third-party add-ons that provide myriads of features to their users
while browsing on the Web. Extensions often interact with the websites a user visits and …

Tacoma: Enhanced Browser Fuzzing with Fine-Grained Semantic Alignment

J Wang, P Qian, X Huang, X Ying, Y Chen, S Ji… - Proceedings of the 33rd …, 2024 - dl.acm.org
Browsers are responsible for managing and interpreting the diverse data coming from the
web. Despite the considerable efforts of developers, however, it is nearly impossible to …

What is in the Chrome Web Store? Investigating Security-Noteworthy Browser Extensions

S Hsu, M Tran, A Fass - arxiv preprint arxiv:2406.12710, 2024 - arxiv.org
This paper is the first attempt at providing a holistic view of the Chrome Web Store (CWS).
We leverage historical data provided by ChromeStats to study global trends in the CWS and …

[PDF][PDF] A Machine Learning-Driven Website Platform and Browser Extension for Real-Time Risk Scoring and Fraud Detection for Website Legitimacy Verification and …

MKH Chy, ON Buadi - Available at SSRN 4975174, 2024 - jmest.org
This paper introduces a Machine Learning-Driven website Platform and Browser Extension
designed to quickly enhance online security by providing real-time risk scoring and fraud …