Главная
Study mode:
on
1
Intro
2
Browser Extensions
3
Motivating Example
4
Privacy Implications
5
Goals
6
Overview
7
Approach
8
Taint Tracking: Challenges
9
Addressing the Challenges: V8
10
Data Flow Graph (DFG)
11
Control-Flow Dependencies
12
Implicit Data Flows
13
Completing the Example
14
Taint Propagation Points
15
Estimating True Positive Rates
16
Number of Affected Users
17
The SimilarWeb Library
18
Web of Trust
19
Limitations
20
Open-sourcing Mystique
21
Conclusion
Description:
Explore the privacy implications of browser extensions in this 23-minute conference talk. Uncover potential information leakage risks associated with third-party code execution in users' browsers. Learn about the Mystique approach to taint tracking, including challenges and solutions like V8, Data Flow Graph (DFG), and control-flow dependencies. Examine real-world examples, estimate true positive rates, and understand the impact on affected users. Gain insights into popular extensions like SimilarWeb and Web of Trust. Discover the limitations of the research and the open-source availability of Mystique for further investigation.

Mystique - Uncovering Information Leakage from Browser Extensions

Association for Computing Machinery (ACM)
Add to list
0:00 / 0:00