This repository contains the artifacts for the aforementioned paper. Each directory contains the files for a different Proof-Of-Concept Chromium extension. All extensions are written using the Manifest V3 specification.
All sample extensions can be installed by either:
- Going to
chrome://extensions
, clicking on "Load Unpacked" and selecting the desired artifact directory. - Packing the artifact directory contents as a ZIP archive and
drag-and-dropping it into
chrome://extensions
.
- Listing active targets
- Running on regular tabs
- Running on security interstitial tabs
- Running on WebUI tabs
- Running on other extensions
- Attaching to the browser target
@inproceedings{chrowned2023,
author = {Moreno, José Miguel and Vallina-Rodriguez, Narseo and Tapiador, Juan},
title = {{Chrowned by an Extension: Abusing the Chrome DevTools Protocol through the Debugger API}},
booktitle = {{Proceedings of the 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P)}},
pages = {832--846},
url = {https://doi.org/10.1109/EuroSP57164.2023.00054},
doi = {10.1109/EuroSP57164.2023.00054},
year = {2023},
month = jul
}
The contents of this repository are available under the MIT License.