DocumentCode :
3100736
Title :
Analyzing Information Flow in JavaScript-Based Browser Extensions
Author :
Dhawan, Mohan ; Ganapathy, Vinod
Author_Institution :
Dept. of Comput. Sci., Rutgers Univ., Piscataway, NJ, USA
fYear :
2009
fDate :
7-11 Dec. 2009
Firstpage :
382
Lastpage :
391
Abstract :
JavaScript-based browser extensions (JSEs) enhance the core functionality of Web browsers by improving their look and feel, and are widely available for commodity browsers. To enable a rich set of functionalities, browsers typically execute JSEs with elevated privileges. For example, unlike JavaScript code in a Web application, code in a JSE is not constrained by the same-origin policy. Malicious JSEs can misuse these privileges to compromise confidentiality and integrity, e.g., by stealing sensitive information, such as cookies and saved passwords, or executing arbitrary code on the host system. Even if a JSE is not overtly malicious, vulnerabilities in the JSE and the browser may allow a remote attacker to compromise browser security. We present Sabre (Security Architecture for Browser Extensions), a system that uses in-browser information-flow tracking to analyze JSEs. Sabre associates a label with each in-memory JavaScript object in the browser, which determines whether the object contains sensitive information. Sabre propagates labels as objects are modified by the JSE and passed between browser subsystems. Sabre raises an alert if an object containing sensitive information is accessed in an unsafe way, e.g., if a JSE attempts to send the object over the network or write it to a file. We implemented Sabre by modifying the Firefox browser and evaluated it using both malicious JSEs as well as benign ones that contained exploitable vulnerabilities. Our experiments show that Sabre can precisely identify potential information flow violations by JSEs.
Keywords :
Java; Web design; authoring languages; formal verification; online front-ends; security of data; Firefox browser; JavaScript based browser extensions; JavaScript code; Sabre; Web application; Web browsers; arbitrary code execution; browser security; commodity browsers; confidentiality; cookies; information flow analysis; integrity; malicious JSE; passwords; Application software; Computer science; Computer security; File systems; History; Information analysis; Information security; Java; Protection; Service oriented architecture; Browser Extensions; Information Flow; JSEs; JavaScript; Vulnerabilities; Web Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Applications Conference, 2009. ACSAC '09. Annual
Conference_Location :
Honolulu, HI
ISSN :
1063-9527
Print_ISBN :
978-0-7695-3919-5
Type :
conf
DOI :
10.1109/ACSAC.2009.43
Filename :
5380696
Link To Document :
بازگشت