Automated Detection of Firefox Extension-Reuse Vulnerabilities

Automated Detection of Firefox Extension-Reuse Vulnerabilities

Black Hat via YouTube Direct link

AST Representation

14 of 28

14 of 28

AST Representation

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Automated Detection of Firefox Extension-Reuse Vulnerabilities

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Agenda
  3. 3 Extensions
  4. 4 Extension Architecture
  5. 5 Threat Model
  6. 6 Existing Methods
  7. 7 Jetpack
  8. 8 Attack Model
  9. 9 Impact
  10. 10 Simple Attack
  11. 11 Challenges
  12. 12 Crossfire
  13. 13 Demo
  14. 14 AST Representation
  15. 15 Global Functions
  16. 16 analyzer
  17. 17 functions
  18. 18 extension folder
  19. 19 secretpets
  20. 20 example
  21. 21 evaluation
  22. 22 working exploits
  23. 23 positive exploits
  24. 24 performance
  25. 25 limitations
  26. 26 Secure Functional Data Sharing
  27. 27 Static Analysis
  28. 28 Conclusions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.