The Evil Friend in Your Browser

Achim D. Brucker und Michael Herzberg

On the one hand, browser extensions, e.g., for Chrome, are very useful, as they extend web browsers with additional functionality (e.g., blocking ads). On the other hand, they are the most dangerous code that runs in your browsers: extension can read and modify both the content displayed in the browser. As they also can communicate with any web-site or web-service, they can report both data and metadata to external parties. The current security model for browser extensions seems to be inadequate for expressing the security or privacy needs of browser users. Consequently, browser extensions are a "juice target" for attackers targeting web users.

We present results of analysing over 2500 browser extensions on how they use the current security model and discuss examples of extensions that are potentially of high risk. Based on the results of our analysis of real world browser extensions as well as our own threat model, we discuss the limitations of the current security model form a user perspective. need of browser users.

Schlüsselwörter:
Kategorien:
Dokumente:

QR Code for talk:brucker.ea:owasp-evil-friend:2017.Bitte zitieren sie diesen Artikel wie folgt:
Achim D. Brucker und Michael Herzberg. The Evil Friend in Your Browser. OWASP AppSec EU, 11. may. 2017.
(Folien) (Handout) (BibTeX) (Share article on LinkedIn. Share article on CiteULike.)

BibTeX
@Talk{ talk:brucker.ea:owasp-evil-friend:2017,
abstract = {On the one hand, browser extensions, e.g., for Chrome, are very useful, as they extend web browsers with additional functionality (e.g., blocking ads). On the other hand, they are the most dangerous code that runs in your browsers: extension can read and modify both the content displayed in the browser. As they also can communicate with any web-site or web-service, they can report both data and metadata to external parties. The current security model for browser extensions seems to be inadequate for expressing the security or privacy needs of browser users. Consequently, browser extensions are a "juice target" for attackers targeting web users.\\\\We present results of analysing over 2500 browser extensions on how they use the current security model and discuss examples of extensions that are potentially of high risk. Based on the results of our analysis of real world browser extensions as well as our own threat model, we discuss the limitations of the current security model form a user perspective. need of browser users.},
author = {Achim D. Brucker and Michael Herzberg},
day = {11},
event = {OWASP AppSec EU},
handout = {https://www.brucker.ch/bibliography/download/2017/talk-brucker.ea-owasp-evil-friend-2017-2x2.pdf},
isodate = {2017-05-11},
lecturer = {Achim D. Brucker},
location = {Belfast, UK},
month = {may},
slides = {https://www.brucker.ch/bibliography/download/2017/talk-brucker.ea-owasp-evil-friend-2017.pdf},
slideshare = {key/kJCkWqdV9RJYFd},
slideshare_height = {485},
slideshare_width = {595},
title = {The Evil Friend in Your Browser},
url = {https://www.brucker.ch/bibliography/abstract/talk-brucker.ea-owasp-evil-friend-2017},
video = {https://youtu.be/3r0u8YpiDTY},
year = {2017},
}