Abstract
There has been an immense utilization of browser extensions these days for providing additional functionality to users over the basic browser functionality. For providing the openness to the developers in bringing additional functionality, browsers frequently give access to most of the security sensitive APIs with an unlimited access control. In the recent times, it has been identified that such access is allowing attackers to carry out cyberfrauds, cyberspying over targeted users using malicious browser extensions. This chapter presents vulnerabilities that are exploited by malicious extensions and identifies possible attacks that can be launched via attackers. It provides browser developers an insight into the current security vulnerabilities to patch them with improved designs in near future to avoid malicious extension-based attacks. Google Chrome browser has been utilized as a case study in this chapter.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.