Session 9A: Web 2 CCS’18, October 15-19, 2018, Toronto, ON, Canada Mystique: Uncovering Information Leakage from Browser Extensions Quan Chen Alexandros Kapravelos North Carolina State University North Carolina State University
[email protected] [email protected] ABSTRACT ACM Reference Format: Browser extensions are small JavaScript, CSS and HTML programs Quan Chen and Alexandros Kapravelos. 2018. Mystique: Uncovering Infor- that run inside the browser with special privileges. These programs, mation Leakage, from Browser Extensions. In 2018 ACM SIGSAC Confer- ence on Computer and Communications Security (CCS ’18), October 15–19, often written by third parties, operate on the pages that the browser 2018, Toronto, ON, Canada. ACM, New York, NY, USA, 14 pages. https: is visiting, giving the user a programmatic way to configure the //doi.org/10.1145/3243734.3243823 browser. The privacy implications that arise by allowing privileged third-party code to execute inside the users’ browser are not well understood. 1 INTRODUCTION In this paper, we develop a taint analysis framework for browser All popular web browsers today offer extension mechanisms that extensions and use it to perform a large scale study of extensions allow users to customize or enrich their web browsing experiences in regard to their privacy practices. We first present a hybrid ap- by modifying the browser’s behavior, enhancing its functionalities proach to traditional taint analysis: by leveraging the fact that or integrating with popular web services. To support interaction extension source code is available to the runtime JavaScript engine, with the visited web pages, such as modifying their the contents we implement as well as enhance traditional taint analysis using or UI layouts, extension frameworks provide mechanisms to in- information gathered from static data flow and control-flow analy- ject custom JavaScript code into a web page and execute in the sis of the JavaScript source code.