Chrome Extentions Vulnerabilities. Introduction Google Chrome Browser Chrome OS Platform Chrome Web Store Applications Open Source Platform.

Slides:



Advertisements
Similar presentations
Hacking Web Servers April 15, 2010 MIS 4600 – MBA © Abdou Illia.
Advertisements

©2009 Justin C. Klein Keane PHP Code Auditing Session 3 – Tools of the Trade & Crafting Malicious Input Justin C. Klein Keane
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Georgios Kontaxis, Michalis Polychronakis Angelos D. Keromytis, Evangelos P. Markatos Siddhant Ujjain (2009cs10219) Deepak Sharma (2009cs10185)
Chromium OS Chase Rogers. User Interface Unobtrusive Use small amount of screen space Combine apps and web pages into one tab strip Floating Windows Search.
An Evaluation of the Google Chrome Extension Security Architecture
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Web 2.0 security Kushal Karanjkar Under guidance of Prof. Richard Sinn.
The Most Dangerous Code in the Browser Stefan Heule, Devon Rifkin, Alejandro Russo, Deian Stefan Stanford University, Chalmers University of Technology.
Objectives Moodle is an online learning environment where instructors & their students interact. In this workshop you will learn: 1.Configure system requirements.
Server-Side vs. Client-Side Scripting Languages
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Browser Exploitation Framework (BeEF) Lab
Safer Web Browsing Terry Labach Information Security Services IST.
Lecture 16 Page 1 CS 236 Online Cross-Site Scripting XSS Many sites allow users to upload information –Blogs, photo sharing, Facebook, etc. –Which gets.
Lab 3 Cookie Stealing using XSS Kara James, Chelsea Collins, Trevor Norwood, David Johnson.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Web-based Document Management System By Group 3 Xinyi Dong Matthew Downs Joshua Ferguson Sriram Gopinath Sayan Kole.
Introduction to InfoSec – Recitation 10 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
Google Chrome Your Customized Google Buddy April 2012 John Riley and Denise Tate-Kuhler.
Web Security Demystified Justin C. Klein Keane Sr. InfoSec Specialist University of Pennsylvania School of Arts and Sciences Information Security and Unix.
+ Working in Your CCE Online Course Site. + Structure of CCE Online Course Sites CCE online courses use the document sharing and collaboration features.
Prepared By, Mahadir Ahmad. StopBadware makes the Web safer through the prevention, mitigation, and remediation of badware websites. partners include.
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
Lecture 16 Page 1 CS 236 Online SQL Injection Attacks Many web servers have backing databases –Much of their information stored in a database Web pages.
Gale to Google Path. Why Gale Chose Google Google has sold over 5 million Chromebooks and has over 40 million Google Apps for Education users worldwide.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1 RubyJax Brent Morris/
Web Attacks— Offense… The Whole Story Yuri & The Cheeseheads Mark Glubisz, Jason Kemble, Yuri Serdyuk, Kandyce Giordano.
Georgios Kontaxis‡, Michalis Polychronakis‡, Angelos D. Keromytis‡, and Evangelos P.Markatos* ‡Columbia University and *FORTH-ICS USENIX-SEC (August, 2012)
Comparing Java and.Net Security: Lessons Learned and Missed - Nathanael Paul, David Evans Presented by Dan Frohlich.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Protecting Browsers from Extension Vulnerabilities Paper by: Adam Barth, Adrienne Porter Felt, Prateek Saxena at University of California, Berkeley and.
GroupWise Collaborate Effectively. GroupWise Features Calendar Contact Management Task Management Notes.
MobileSecurity Vulnerability Assessment Tools for the Enterprise Mobile Security Vulnerability Assessment Tools for the Enterprise Integrating Mobile/BYOD.
Plug-in Architectures Presented by Truc Nguyen. What’s a plug-in? “a type of program that tightly integrates with a larger application to add a special.
Android Permissions Demystified
1 Utkarsha MishraCOMPSCI 725 David Silver, Suman Jana, Eric Chen, Collin Jackson, and Dan Boneh. “Password Managers: Attacks and Defenses.” In Proceedings.
XSS VULNERABILITIES Nicole Coppola. XSS - Capabilities Cookie Theft – Session Hijacking Keylogging – addEventListener; passwords, credit cards, etc. Phishing.
Our relationship is changing + Gaggle Next UI: support documents.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Web Server Security: Protecting Your Pages NOAA OAR WebShop 2001 August 2 nd, 2001 Jeremy Warren.
© 2015 IBM Corporation John Guidone Account Executive IBM Security IBM MaaS360.
Best ways to Hack Facebook Account Now a days Facebook becomes the number 1 social networking portal that touches every one’s life. People are now a days.
By Collin Donaldson. Hacking is only legal under the following circumstances: 1.You hack (penetration test) a device/network you own. 2.You gain explicit,
Page 1 Ethical Hacking by Douglas Williams. Page 2 Intro Attackers can potentially use many different paths through your application to do harm to your.
Google Apps for Education Account Overview for Staff.
● The most common website platform ● User friendly-easy to edit ● Constantly improving-updates, plugins, themes Why WordPress?
SlideSet #20: Input Validation and Cross-site Scripting Attacks (XSS) SY306 Web and Databases for Cyber Operations.
Javascript worms By Benjamin Mossé SecPro
Tonga Institute of Higher Education IT 141: Information Systems
World Wide Web policy.
SQL Injection Attacks Many web servers have backing databases
SSOScan: Automated Testing of Web Applications for Single Sign-On Vulnerabilities Yuchen Zhou, and David Evans 23rd USENIX Security Symposium, August,
Myths About Web Application Security That You Need To Ignore.
How Can I Create A Gmail Account
What Is Sharepoint? Mohsen Ashkboos
Intro to Ethical Hacking
Intro to Ethical Hacking
Information Technology Services
Tonga Institute of Higher Education IT 141: Information Systems
AppExchange Security Certification
Connecting Remotely Winter 2014.
SharePoint Online Authentication Patterns
Tonga Institute of Higher Education IT 141: Information Systems
David Cleverly – Development Lead
Running C# in the browser
Web Application Development Using PHP
Protecting Browsers from Extension Vulnerabilities
Presentation transcript:

Chrome Extentions Vulnerabilities

Introduction Google Chrome Browser Chrome OS Platform Chrome Web Store Applications Open Source Platform

Vulnerabilities Statistics 27 out of 100 tested extensions of Chrome Browser vulnerable to attack by extracting data (password, history, etc.) Malicious applications Gain control over your Google account (G-mail, Calendar etc.) Java Script- injection vulnerabilities More the 25% of testing extensions from researcher were considered vulnerable under this attack and 7 of those application used from more then users!!! Security flows in chrome OS Hackers access your data on the cloud without event has access to the user pc. Exits design flows that gives extensions sweeping rights to access data on the cloud.

Research 3 types of extensions: core extensions- main portion of an extension content scripts - are JavaScript that are injected into web sites Plugins – native executable Each app or extensions ask for permission before install- but who reads them??? 2 Types of permissions : Time-of-use systems - prompt the user to approve of needed permissions at the runtime of the application. install-time systems -ask for permissions at the time the extension is installed.

Risk Management Extensions required permissions Plug ins – is granted full permissions to everything on users machine (because is local executable) Extensions with plug ins are reviewed Core extensions – comes with the extention API which is a browser manager that allows access to bookmarks, history and geo-location.

Findings 500 most popular extensions 91.4% of them ask for at least one security-relevant permission. This means that almost every extension installalation generates at least one security warning. 10% of applications request unneeded permissions. no developer tools on any platform with install-time permissions that provide developer tools to detect unnecessary permissions.

Scratchpad App example Scratchpad extension for Google Docs Installed by default on Chrome notebook The permissions allow it to auto-sync with user’s Google Doc account! The catch- Google Docs lets users share documents with others without first asking the receiving user if they want to receive the document or not. The result of hacking this app from the researchers: Johansen was able to share a malicious note through Scratchpad which, when opened, stole all of the user’s Gmail contacts.

Our experiment User downloads our app Goes to the blog and let say he want to write something. In order to right something a pop up appear so he can log though Facebook using his credentials What we do ? We still his username and password … So what’s is the conclusion ? Don’t download our app ;D

Use case Diagram

Solutions The Good news is that: o 49 of 51 vulnerabilities can be patched just by using one of two proposed safety rules (Content Security Policies). o Peer feedback on applications (Ratings) o Trust No-one o Read permissions

Conclusion Google Chrome browser that the third-party code extensions cannot be 100% trusted every extension requests for permissions that are irrelevant to the purpose of the application. Humans are not perfect – checking code is not an easy task Suggestion : Google need better graphical interface which instructs end users that high level security risk permissions

Reference Felt, Adrienne, Kate Greenwood, and David Wagner. "The Effectiveness of Application Permissions." USENIX Association. 2. (2011): n. page. Web. 28 Feb < final_files/webapps11_proceedings.pdf 25% of tested extensions of Google Chrome admit stealing data, stealing-data/, October 2011 Chrome OS Hacked via Scratchpad, scratchpad/ Chrome OS has security flaws, claims researcher, by Lance Whitney Security Expert Raises Questions Regarding Security Issues Regarding Chrome Web Store ARUPCHOU on MAY 29, chrome/security-expert-raises-questionsregarding-security-issues- regarding-chrome-web-store/