
638 P. Picazo-Sanchez et al.
Open Access This article is distributed under the terms of the Creative
Commons Attribution 4.0 International License (http://creativecomm
ons.org/licenses/by/4.0/), which permits unrestricted use, distribution,
and reproduction in any medium, provided you give appropriate credit
to the original author(s) and the source, provide a link to the Creative
Commons license, and indicate if changes were made.
References
1. Arshad, S., Kharraz, A., Robertson, W.: Include me out: In-
browser detection of malicious third-party content inclusions. In:
J. Grossklags, B. Preneel (eds.) FC, pp. 441–459 (2017)
2. Bandhakavi, S., Tiku, N., Pittman, W., King, S.T., Madhusudan, P.,
Winslett, M.: Vetting browser extensions for security vulnerabili-
ties with vex. Commun. ACM 54(9), 91–99 (2011)
3. Bauer, L., Cai, S., Jia, L., Passaro, T., Stroucken, M., Tian, Y.:
Run-time monitoring and formal analysis of information flows in
chromium. In: NDSS (2015)
4. Bauer, L., Cai, S., Jia, L., Passaro, T., Tian, Y.: Analyzing the dan-
gers posed by chrome extensions. In: CNS„ pp. 184–192 (2014)
5. ons Blog, M.A.: How many firefox users have add-ons
installed? https://blog.mozilla.org/addons/2011/06/21/firefox-4-
add-on- users/ (2018)
6. Chrome: External Extensions. https://developer.chrome.com/
extensions/external_extensions (2018)
7. Committee, W.D.T.: W3C DOM4. https://www.w3.org/TR/
domcore/ (2018)
8. Developer., J.A.G.C.: Tasks, microtasks, queues and schedules.
https://jakearchibald.com/2015/tasks-microtasks-queues-and-
schedules/ (2018)
9. Dhawan, M., Ganapathy, V.: Analyzing information flow in
javascript-based browser extensions. In: ACSAC, pp. 382–391
(2009)
10. difflib: difflib. https://docs.python.org/2/library/difflib.html (2018)
11. Extensity: Extensity. https://chrome.google.com/webstore/ detail/
extensity/jjmflmamggggndanpgfnpelongoepncg (2018)
12. Google: Design of V8 bindings. https://chromium.googlesource.
com/chromium/src/ third_party/+/master/ WebKit/Source/
bindings/core/v8/ V8BindingDesign.md#World (2018)
13. Guha, A., Fredrikson, M., Livshits, B., Swamy, N.: Verified security
for browser extensions. In: S&P, pp. 115–130 (2011).
14. Gulyas, G.G., Some, D.F., Bielova, N., Castelluccia, C.: To extend
or not to extend: On the uniqueness of browser extensions and web
logins. In: Proceedings of the 2018 Workshop on Privacy in the
Electronic Society, WPES’18, pp. 14–27 (2018)
15. HMAC: Chromium Secure Preferences. http://www.adlice.com/
google-chrome- secure-preferences/ (2018)
16. Ilya Grigorik: Measuring the Critical Rendering Path. https://
developers.google.com/web/fundamentals/performance/ critical-
rendering-path/measure-crp (2018)
17. Jagpal, N., Dingle, E., Gravel, J.P., Mavrommatis, P., Provos, N.,
Rajab, M.A., Thomas, K.: Trends and lessons from three years
fighting malicious extensions. In: USENIX, pp. 579–593 (2015)
18. JavaScript: Bubbling and capturing. https://javascript.info/
bubbling-and-capturing (2018)
19. jsdiff: jsdiff. https://github.com/kpdecker/jsdiff (2018)
20. Kapravelos, A., Grier, C., Chachra, N., Kruegel,C., Vigna, G., Pax-
son, V.: Hulk: Eliciting malicious behavior in browser extensions.
In: USENIX, pp. 641–654. USENIX Association, San Diego, CA
(2014)
21. Laperdrix, P., Bielova, N., Baudry, B., Avoine, G.: Browser finger-
printing: A survey (2019)
22. Onarlioglu, K., Buyukkayhan, A.S., Robertson, W., Kirda, E.: Sen-
tinel: Securing legacy firefox extensions. Computers & Security 49,
147—161 (2015)
23. Projects, C.: Chromium. https://www.chromium.org (2018)
24. Provos, N., McNamee, D., Mavrommatis, P., Wang, K., Modadugu,
N.: The ghost in the browser analysis of web-based malware.
In: HotBots, pp. 4–4. USENIX Association, Berkeley, CA, USA
(2007)
25. Rogowski, R., Morton, M., Li, F., Monrose, F., Snow, K.Z., Poly-
chronakis, M.: Revisiting browser security in the modern era: New
data-only attacks and defenses. In: EuroS&P, pp. 366–381 (2017)
26. Saini, A., Gaur, M.S., Laxmi, V., Conti, M.: Colluding browser
extension attack on user privacy and its implication for web
browsers. Computers & Security 63, 14—28 (2016)
27. Saini, A., Gaur, M.S., Laxmi, V., Conti, M.: You click, i steal:
analyzing and detecting click hijacking attacks in web pages. Inter-
national Journal of Information Security (2018)
28. Schaub, F., Marella, A., Kalvani, P., Ur, B., Pan, C., Forney, E.,
Cranor, L.F.: Watching them watching me: Browser extensions’
impact on user privacy awareness and concern. In: NDSS (2016)
29. Scott Helme: Alexa Top 1 Million Analysis. https://scotthelme.co.
uk/alexa-top- 1-million- analysis-feb- 2017/ (2018)
30. Shahriar, H., Weldemariam, K., Zulkernine, M., Lutellier, T.: Effec-
tive detection of vulnerable and malicious browser extensions.
Computers & Security 47, 66—84 (2014). Trust in Cyber, Physical
and Social Computing
31. Sjösten, A., Van Acker, S., Picazo-Sanchez, P., Sabelfeld, A.: Latex
gloves: Protecting browser extensions from probing and revelation
attacks. Power p. 57 (2018)
32. Software, T.A.: Chrome Secure Preferences Modification.
https://cs.chromium.org/chromium/src/rlz/lib/machine_id.cc?
sq=package:chromium (2018)
33. Trickel, E., Starov, O., Kapravelos, A., Nikiforakis, N., Doupé,
A.: Everyone is different: Client-side diversification for defend-
ing against extension fingerprinting. In: USENIX, pp. 1679–1696
(2019)
34. W3C: Navigation timing. https://www.w3.org/TR/navigation-
timing/ (2018)
35. w3schools: Browser Statistics. https://www.w3schools.com/
browsers/ (2018)
36. Wang,L., Xiang, J., Jing, J., Zhang, L.: Towards fine-grained access
control on browser extensions. In: M.D. Ryan, B. Smyth, G. Wang
(eds.) ISPEC, pp. 158–169 (2012)
37. Xing, X., Meng, W., Lee, B., Weinsberg,U., Sheth, A., Perdisci, R.,
Lee, W.: Understanding malvertising through ad-injecting browser
extensions. In: WWW, pp. 1286–1295 (2015)
38. Zhao, B., Liu, P.: Behavior decomposition: Aspect-level browser
extension clustering and its security implications. In: S.J. Stolfo,
A. Stavrou, C.V. Wright (eds.) RAID, pp. 244–264 (2013)
39. Zhao, R., Yue, C., Yi, Q.: Automatic detection of information
leakage vulnerabilities in browser extensions. In: WWW, pp. 1384–
1394 (2015)
Publisher’s Note Springer Nature remains neutral with regard to juris-
dictional claims in published maps and institutional affiliations.
123