TY - JOUR
T1 - Vetting browser extensions for security vulnerabilities with Vex
AU - Bandhakavi, Sruthi
AU - Tiku, Nandit
AU - Pittman, Wyatt
AU - King, Samuel T.
AU - Madhusudan, P.
AU - Winslett, Marianne
PY - 2011/9
Y1 - 2011/9
N2 - The browser has become the de facto platform for everyday computation and a popular target for attackers of computer systems. Among the many potential attacks that target or exploit browsers, vulnerabilities in browser extensions have received relatively little attention. Currently, extensions are vetted by manual inspection, which is time consuming and subject to human error. In this paper, we present Vex, a framework for applying static information flow analysis to JavaScript code to identify security vulnerabilities in browser extensions. We describe several patterns of flows that can lead to privilege escalations in Firefox extensions. Vex analyzes Firefox extensions for such flow patterns using high-precision, context-sensitive, flow-sensitive static analysis. We subject 2460 browser extensions to the analysis, and Vex finds 5 of the 18 previously known vulnerabilities and 7 previously unknown vulnerabilities.
AB - The browser has become the de facto platform for everyday computation and a popular target for attackers of computer systems. Among the many potential attacks that target or exploit browsers, vulnerabilities in browser extensions have received relatively little attention. Currently, extensions are vetted by manual inspection, which is time consuming and subject to human error. In this paper, we present Vex, a framework for applying static information flow analysis to JavaScript code to identify security vulnerabilities in browser extensions. We describe several patterns of flows that can lead to privilege escalations in Firefox extensions. Vex analyzes Firefox extensions for such flow patterns using high-precision, context-sensitive, flow-sensitive static analysis. We subject 2460 browser extensions to the analysis, and Vex finds 5 of the 18 previously known vulnerabilities and 7 previously unknown vulnerabilities.
UR - http://www.scopus.com/inward/record.url?scp=80052322972&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=80052322972&partnerID=8YFLogxK
U2 - 10.1145/1995376.1995398
DO - 10.1145/1995376.1995398
M3 - Article
AN - SCOPUS:80052322972
SN - 0001-0782
VL - 54
SP - 91
EP - 99
JO - Communications of the ACM
JF - Communications of the ACM
IS - 9
ER -