Mystique - Uncovering Information Leakage from Browser Extensions
Association for Computing Machinery (ACM) via YouTube
Overview
Syllabus
Intro
Browser Extensions
Motivating Example
Privacy Implications
Goals
Overview
Approach
Taint Tracking: Challenges
Addressing the Challenges: V8
Data Flow Graph (DFG)
Control-Flow Dependencies
Implicit Data Flows
Completing the Example
Taint Propagation Points
Estimating True Positive Rates
Number of Affected Users
The SimilarWeb Library
Web of Trust
Limitations
Open-sourcing Mystique
Conclusion
Taught by
Association for Computing Machinery (ACM)