Fingerprinting the fingerprinters: Learning to detect browser fingerprinting behaviors

U Iqbal, S Englehardt, Z Shafiq - 2021 IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Browser fingerprinting is an invasive and opaque stateless tracking technique. Browser
vendors, academics, and standards bodies have long struggled to provide meaningful …

{DONAPI}: Malicious {NPM} Packages Detector using Behavior Sequence Knowledge Map**

C Huang, N Wang, Z Wang, S Sun, L Li… - 33rd USENIX Security …, 2024 - usenix.org
With the growing popularity of modularity in software development comes the rise of
package managers and language ecosystems. Among them, npm stands out as the most …

Mining node. js vulnerabilities via object dependence graph and query

S Li, M Kang, J Hou, Y Cao - 31st USENIX Security Symposium …, 2022 - usenix.org
Node. js is a popular non-browser JavaScript platform that provides useful but sometimes
also vulnerable packages. On one hand, prior works have proposed many program analysis …

Detecting Node. js prototype pollution vulnerabilities via object lookup analysis

S Li, M Kang, J Hou, Y Cao - Proceedings of the 29th ACM Joint Meeting …, 2021 - dl.acm.org
Prototype pollution is a type of vulnerability specific to prototype-based languages, such as
JavaScript, which allows an adversary to pollute a base object's property, leading to a further …

MFXSS: An effective XSS vulnerability detection method in JavaScript based on multi-feature model

Z Liu, Y Fang, C Huang, Y Xu - Computers & Security, 2023 - Elsevier
The widespread use of web applications has also made them more vulnerable to hackers,
resulting in the leakage of large amounts of application and personal privacy data. Cross …

Doublex: Statically detecting vulnerable data flows in browser extensions at scale

A Fass, DF Somé, M Backes, B Stock - Proceedings of the 2021 ACM …, 2021 - dl.acm.org
Browser extensions are popular to enhance users' browsing experience. By design, they
have access to security-and privacy-critical APIs to perform tasks that web applications …

Scaling javascript abstract interpretation to detect and exploit node. js taint-style vulnerability

M Kang, Y Xu, S Li, R Gjomemo, J Hou… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Taint-style vulnerabilities, such as OS command injection and path traversal, are common
and severe software weaknesses. There exists an inherent trade-off between analysis …

Maltracker: A fine-grained npm malware tracker copiloted by llm-enhanced dataset

Z Yu, M Wen, X Guo, H ** - Proceedings of the 33rd ACM SIGSOFT …, 2024 - dl.acm.org
As the largest package registry, Node Package Manager (NPM) has become the prime
target for various supply chain attacks recently and has been flooded with numerous …

RuleKeeper: GDPR-aware personal data compliance for web frameworks

M Ferreira, T Brito, JF Santos… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
Pressured by existing regulations such as the EU GDPR, online services must advertise a
personal data protection policy declaring the types and purposes of collected personal data …

CoCo: Efficient Browser Extension Vulnerability Detection via Coverage-guided, Concurrent Abstract Interpretation

J Yu, S Li, J Zhu, Y Cao - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Extensions complement web browsers with additional functionalities and also bring new
vulnerability venues, allowing privilege escalations from adversarial web pages to use …