A4 Vertaisarvioitu artikkeli konferenssijulkaisussa

Man-in-the-browser Attack: A Case Study on Malicious Browser Extensions




TekijätSampsa Rauti

ToimittajaSabu M. Thampi, Gregorio Martinez Perez, Ryan Ko, Danda B. Rawat

Konferenssin vakiintunut nimiInternational Symposium on Security in Computing and Communication

Julkaisuvuosi2020

JournalCommunications in Computer and Information Science

Kokoomateoksen nimiSecurity in Computing and Communications: 7th International Symposium, SSCC 2019, Trivandrum, India, December 18–21, 2019, Revised Selected Papers

Sarjan nimiCommunications in Computer and Information Science

Vuosikerta1208

Aloitussivu60

Lopetussivu71

ISBN978-981-15-4824-6

ISSN1865-0929

DOIhttps://doi.org/10.1007/978-981-15-4825-3_5

Rinnakkaistallenteen osoitehttps://research.utu.fi/converis/portal/detail/Publication/44603241


Tiivistelmä

Man-in-the-browser (MitB) attacks, often implemented as malicious browser extensions, have the ability to alter the structure and contents of web pages, and stealthily change the data given by the user before it is sent to the server. This is done without the user or the online service (the server) noticing anything suspicious. In this study, we present a case study on the man-in-the-browser attack. Our proof-of-concept implementation demonstrates how easily this attack can be implemented as a malicious browser extension. The implementation is a UI-level, cross-browser implementation using JavaScript. We also successfully test the extension in a real online bank. By demonstrating a practical man-in-the-browser attack, our research highlights the need to better monitor and control malicious browser extensions.


Ladattava julkaisu

This is an electronic reprint of the original article.
This reprint may differ from the original in pagination and typographic detail. Please cite the original version.





Last updated on 2024-26-11 at 22:33