TY - GEN
T1 - VEX
T2 - 19th USENIX Security Symposium
AU - Bandhakavi, Sruthi
AU - King, Samuel T.
AU - Madhusudan, P.
AU - Winslett, Marianne
N1 - Publisher Copyright:
copyright © 2010 USENIX Security Symposium.All right reserved.
PY - 2010
Y1 - 2010
N2 - The browser has become the de facto platform for everyday computation. Among the many potential attacks that target or exploit browsers, vulnerabilities in browser extensions have received relatively little attention. Currently, extensions are vetted by manual inspection, which does not scale well and is subject to human error. In this paper, we present VEX, a framework for highlighting potential security vulnerabilities in browser extensions by applying static information-flow analysis to the JavaScript code used to implement extensions. We describe several patterns of flows as well as unsafe programming practices that may lead to privilege escalations in Firefox extensions. VEX analyzes Firefox extensions for such flow patterns using high-precision, context-sensitive, flow-sensitive static analysis. We analyze thousands of browser extensions, and VEX finds six exploitable vulnerabilities, three of which were previously unknown. VEX also finds hundreds of examples of bad programming practices that may lead to security vulnerabilities. We show that compared to current Mozilla extension review tools, VEX greatly reduces the human burden for manually vetting extensions when looking for key types of dangerous flows.
AB - The browser has become the de facto platform for everyday computation. Among the many potential attacks that target or exploit browsers, vulnerabilities in browser extensions have received relatively little attention. Currently, extensions are vetted by manual inspection, which does not scale well and is subject to human error. In this paper, we present VEX, a framework for highlighting potential security vulnerabilities in browser extensions by applying static information-flow analysis to the JavaScript code used to implement extensions. We describe several patterns of flows as well as unsafe programming practices that may lead to privilege escalations in Firefox extensions. VEX analyzes Firefox extensions for such flow patterns using high-precision, context-sensitive, flow-sensitive static analysis. We analyze thousands of browser extensions, and VEX finds six exploitable vulnerabilities, three of which were previously unknown. VEX also finds hundreds of examples of bad programming practices that may lead to security vulnerabilities. We show that compared to current Mozilla extension review tools, VEX greatly reduces the human burden for manually vetting extensions when looking for key types of dangerous flows.
UR - http://www.scopus.com/inward/record.url?scp=85076320754&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85076320754&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:85076320754
T3 - Proceedings of the 19th USENIX Security Symposium
SP - 339
EP - 354
BT - Proceedings of the 19th USENIX Security Symposium
PB - USENIX Association
Y2 - 11 August 2010 through 13 August 2010
ER -