Главная
Study mode:
on
1
Introduction
2
Agenda
3
Extensions
4
Extension Architecture
5
Threat Model
6
Existing Methods
7
Jetpack
8
Attack Model
9
Impact
10
Simple Attack
11
Challenges
12
Crossfire
13
Demo
14
AST Representation
15
Global Functions
16
analyzer
17
functions
18
extension folder
19
secretpets
20
example
21
evaluation
22
working exploits
23
positive exploits
24
performance
25
limitations
26
Secure Functional Data Sharing
27
Static Analysis
28
Conclusions
Description:
Explore the world of Firefox extension security in this 57-minute Black Hat conference talk. Delve into the novel extension-reuse vulnerability that allows adversaries to launch stealthy attacks against users. Learn about CROSSFIRE, a lightweight static analyzer for Firefox legacy extensions that automatically discovers vulnerabilities and generates exploit templates. Discover how popular extensions, downloaded by millions of users, contain exploitable extension-reuse vulnerabilities. Examine the impact of these vulnerabilities, challenges in detection, and potential solutions through a comprehensive analysis of extension architecture, threat models, and existing security methods. Gain insights into the effectiveness of malicious extensions in evading detection by extension vetters. Understand the implications for browser security and the importance of addressing these vulnerabilities to protect users' sensitive information and system resources.

Automated Detection of Firefox Extension-Reuse Vulnerabilities

Black Hat
Add to list
0:00 / 0:00