Mbe 25
Mbe 25
1st Shreya Singh 2nd Gaurav Varshney 3rd Tarun Kumar Singh 4th Vidhi Mishra
Department of CSE, IIT Jammu Department of CSE, IIT Jammu Department of CSE, IIT Jammu Department of CSE, IIT Jammu
Jammu, India Jammu, India Jammu, India Jammu, India
[email protected] [email protected] [email protected] [email protected]
Abstract—Browser extensions are additional tools developed keylogging, spying, data theft, and session hijacking [16].
by third parties that integrate with web browsers to extend This dual nature—offering benefits while posing signifi-
their functionality beyond standard capabilities. However, cant risks—has made browser extensions a critical focus
the browser extension platform is increasingly being ex- of cybersecurity research.
ploited by hackers to launch sophisticated cyber threats. This paper aims to study and experimentally validate
These threats encompass a wide range of malicious activities, the inherent malicious capabilities of browser extensions,
arXiv:2503.04292v1 [cs.CR] 6 Mar 2025
including but not limited to phishing, spying, Distributed with a particular focus on Mozilla Firefox and Chrome,
Denial of Service (DDoS) attacks, email spamming, affil- the world’s most widely used browser [1]. By analyzing
iate fraud, malvertising, and payment fraud. This paper real-world examples and examining attack techniques em-
examines the evolving threat landscape of malicious browser ployed by malicious extensions, the study highlights the
extensions in 2025, focusing on Mozilla Firefox and Chrome. evolving threat landscape posed by browser extensions in
Our research successfully bypassed security mechanisms of the year 2025. The experiments and findings presented in
Firefox and Chrome, demonstrating that malicious exten- this paper are designed to assist internet researchers and
sions can still be developed, published, and executed within users in understanding these threats, while also guiding the
the Mozilla Add-ons Store and Chrome Web Store. These industry toward the development of effective controls and
findings highlight the persisting weaknesses in browser’s vet- countermeasures to mitigate risks associated with browser
ting process and security framework [1]. It provides insights extensions.
into the risks associated with browser extensions, helping Ultimately, this research underscores the critical need
users understand these threats while aiding the industry in for secure practices and policies to protect against browser
developing controls and countermeasures to defend against extension attacks. It also emphasizes the importance of
such attacks. All experiments discussed in this paper were striking a balance between providing APIs for extended
conducted in a controlled laboratory environment by the functionality and addressing the security risks they intro-
researchers, adhering to proper ethical guidelines. The sole duce, which can often go undetected. While this study
purpose of these experiments is to raise security awareness focuses on Google Chrome and Mozilla Firefox, most
among the industry, research community, and the general modern browsers, including Microsoft Edge, Safari, sup-
public. port extensions built on standardized APIs. Many of the
attack techniques explored in this paper could be adapted
Index Terms—Browser Extensions, Malicious Browser Ex- to other browsers, suggesting a broader industry-wide risk.
tensions, Attacks due to Extensions.
Our research involved creating and testing multiple to achieve similar results. Firefox’s continued support for
extensions to evaluate their impact on privacy and security. the Web Request API increased its exposure to data in-
Minimal permissions—such as activeTab, scripting, and terception threats. Case studies from 2024 illustrate these
storage—were sufficient for executing harmful actions, risks. Cyberhaven revealed how a supply chain attack
making these tools easy to develop even for low-skilled compromised developer accounts to distribute extensions
attackers. For example, the Cookie Stealing and Keylogger that stole Facebook access tokens and bypassed two-factor
Extensions accessed login credentials and cookies, exfil- authentication. StealthSpy, initially marketed as a pro-
trating this data to remote servers. The Screenshot Capture ductivity tool, later functioned as a keylogger, capturing
and History Tracker Extensions covertly recorded user user keystrokes via Chrome’s scripting API. AdSkimmer
activity, offering attackers insights into browsing behavior. Pro, disguised as an ad-blocker, injected advertisements
Notably, Chrome’s Web Store exhibited stricter security and intercepted affiliate revenue, causing financial losses.
policies, flagging high-risk behaviors like unauthorized QuickAccess Helper, promoted as a browsing speed en-
cookie access, keystroke logging, and direct DOM ma- hancer, redirected users to phishing sites for credential
nipulation, while Firefox’s Add-ons Store showed greater theft.
susceptibility to obfuscation techniques. Extensions de-
signed to modify web content, inject ads, or track user
activity were more likely to pass Firefox’s review when
disguised as productivity tools.
Despite security enhancements, certain types of ex- These incidents highlight the need for stronger security
tensions, such as those that manipulate browsing his- measures across all browsers [5], [8], [9], [10]. While
tory or automate actions like liking content, continue to Chrome’s MV3 has reduced attack vectors, threat actors
evade detection. Recent attacks in 2024 further exposed continue adapting. Firefox’s lenient API policies present
browser vulnerabilities. Extensions like DataPhisher and trade-offs between security and flexibility, while Edge and
StealthSpy bypassed detection with advanced obfuscation, Safari face similar challenges. Continuous improvements
harvesting credentials and manipulating web traffic [26]. in anomaly detection, stricter vetting, and behavioral anal-
While MV3 restricted direct network access in Chrome, ysis are essential to mitigating the ongoing risks posed by
attackers leveraged injected scripts and permission abuse browser extensions.
4. Malicious Browser Extensions: Threat • Request Forgery Extensions : These extensions
Landscape in 2025 focus on state-changing actions without user con-
sent. They can manipulate web requests to exe-
Malicious Browser extensions represent a growing cute unauthorized actions such as changing user
threat to user data privacy and security. This section settings, submitting forms, or initiating financial
explores the various types of threats posed by these ex- transactions. These activities can lead to unautho-
tensions in the year 2025 and discusses their implications. rized access, data breaches, and exploitation of
The study in this section has been done by the authors in users’ online accounts.
their laboratory environment over a period of 6 months. • Miscellaneous Extensions : Malicious Browser
The researchers were motivated to build a set of extensions extensions are adept at bypassing security mech-
over MV3 for chrome and MV2 for firefox and using the anisms designed to protect users. They can avoid
existing APIs exposed by Chrome and Mozilla till Decem- detection by security tools, and exploit vulnerabil-
ber 2024 to cause a security or privacy issue to the user ities in browsers or other software [26]. Further-
that installs the extensions. The extensions developed were more, they may engage in network-based attacks
tested by another researcher and verified to be working to disrupt users’ Internet connections and prop-
fine over their browsers before including them into the set agate themselves via social engineering tactics.
of extensions discussed in this paper. Due to the reason Additionally, some extensions are specifically de-
that such extensions can be misused and to not provide signed to manipulate the appearance or functional-
an easy-to-build environment of such extensions to script ity of websites, such as altering background colors
kiddies, only a portion of the codes of the extension or injecting hidden elements into the page. While
is displayed here and no completed code reference has these may seem innocuous at first glance, they can
been hosted at any platform. The researchers have studied be used for malicious purposes such as redirecting
past work and extensions and tested through experiments users to fraudulent sites or tricking them into
whether the threats raised via researchers in the past are revealing sensitive information. Furthermore, ma-
still there or are patched and whether there are possibilities licious extensions can pose risks through deceptive
of new, more capable malicious extensions that can be actions, such as impersonating legitimate tools or
developed with the new set of APIs which are available to services.
third-party developers. We have discussed some important
malicious browser extensions that we experimented and 5. Experimenting Browser MBEs in 2025
tested during our study. We classified various extensions
that we studied based on the types of threat they pose into During our research one of our major contribution is
the below given 5 classes: that we have created a set of innovative malicious browser
extensions from the past based on the categorization of
• Data Stealing Extensions : Data theft is a pri- malicious actions described in the threat model and re-
mary concern associated with malicious Browser alized their execution on the latest and Chrome browser
extensions. These extensions can harvest sensitive Version 131.0.6778.20 and and Firefox browser Version
information such as names, addresses, phone num- 123.0. While we discuss the high-level functionality and
bers, and email addresses. Furthermore, they are provide key snapshots of these extensions, we have de-
capable of capturing login credentials and stealing liberately withheld the complete code to prevent misuse
financial information such as credit card numbers by malicious actors and script kiddies. To assess whether
and bank account details. the created malicious extensions could bypass Chrome
• Monitoring and Surveillance Extensions : Ma- Web Store’s and Mozilla Add-On’s vetting process, we at-
licious extensions often include monitoring and tempted to submit sample extensions. The extensions that
surveillance capabilities. They can track users’ requested excessive permissions or contained obfuscated
browsing history, record keystrokes through key- code were flagged during automated scans. However,
logging techniques, and even take screenshots of those mimicking legitimate functionality with delayed ma-
users’ screens without their knowledge or consent. licious behavior remained undetected, highlighting gaps
This surveillance can compromise users’ privacy in security review system. This research provides insights
and expose sensitive information. Privacy invasion into the evolving threat landscape and highlights how such
is another significant threat posed by malicious extensions can compromise privacy and security.
Browser extensions. These extensions may access
a user’s camera and microphone without autho- 5.1. Cookie Stealing Extension
rization, potentially recording audio and video.
Additionally, they can track a user’s physical lo- The cookie-stealing extension represents a critical se-
cation using geolocation APIs, exploiting this in- curity threat by demonstrating how malicious browser
formation for malicious purposes. extensions can access and log important access tokens
• Content Manipulation Extensions : Manipula- such as cookies without user consent. Attackers can use
tion of web content by malicious extensions is this method to hijack user sessions, steal authentication
a tactic used to deceive users and achieve nefar- tokens, and exfiltrate sensitive information.
ious goals. Extensions can inject advertisements The extension operates by listening for specific
into web pages, modify content to mislead users, messages from the browser, particularly those request-
and employ social engineering techniques to trick ing cookie information. Upon receiving such a re-
users into divulging sensitive information. quest, it extracts the domain from the active tab’s URL
and utilizes the chrome.cookies.getAll (for Chrome) or to extract information from restricted web applications and
browser.cookies.getAll (for Firefox) [17] API to retrieve all compromise user security.
cookies associated with that domain. The extension then The extension’s background script initializes upon
logs these cookies, including their names and values, and installation using chrome.runtime.onInstalled.addListener
exfiltrates them to a remote server using a JavaScript Fetch (Chrome) or browser.runtime.onInstalled.addListener
API request. This method allows attackers to gain access (Firefox) [21]. The extension monitors tab activity
to users’ authentication tokens, leading to session hijack- using chrome.tabs.onUpdated.addListener (Chrome)
ing and unauthorized account access. The permissions or browser.tabs.onUpdated.addListener (Firefox) [18],
required for this operation include cookies, activeTab, and ensuring it captures screenshots as soon as a user
storage as shown in Figure 1. navigates to a new webpage. The captured screenshot is
then forwarded to an attacker-controlled server via an
HTTP request.
The captureAndDownloadScreenshot function
utilizes chrome.tabs.captureVisibleTab (Chrome) or
browser.tabs.captureVisibleTab (Firefox) [18] to take
Figure 1. Cookie stealing operation in Chrome and Firefox extensions.
a PNG-format screenshot. The required permissions
include tabs, activeTab, scripting, and storage as shown
in Figure 3.
5.2. Keylogger Extension
Keyloggers remain one of the most severe security
threats in the digital landscape, as they covertly cap-
ture sensitive user inputs, including passwords, personal
messages, and financial details. The implementation of a
keylogger through a browser extension allows for discreet
data collection without the user’s awareness.
In this study, we implemented a keylogger using both
Chrome and Firefox extensions to analyze its feasibility
Figure 3. Screenshot capture process in Chrome and Firefox extensions.
and impact. The extension works by injecting an event
listener into web pages to monitor keypress events. The
collected keystrokes are then sent to a background script
that processes and logs them. The background script lis- 5.4. History Tracker by Browser Extension
tens for messages from the content script and retrieves
recorded keystrokes, which are processed and sent to an
This extension falls under the category of privacy inva-
external server for storage.
sion and data exfiltration attacks. By leveraging browser
When a message of type getKeys is received, the
APIs, it collects users’ browsing history, which can be
background script queries the currently active tab us-
used for profiling, targeted phishing, and user behavior
ing chrome.tabs.query (Chrome) or browser.tabs.query
analysis.
(Firefox) [18]. The recorded keystrokes are then for-
warded using chrome.tabs.sendMessage (Chrome) or The extension accesses historical browsing data using
browser.tabs.sendMessage (Firefox) [18], as shown in Fig- chrome.history.search, chrome.history.getVisits (Chrome)
ure 2. The extension requires activeTab, scripting, and or browser.history.search, browser.history.getVisits (Fire-
storage permissions. fox) [22]. It logs the extracted URLs along with times-
tamps and user interactions, creating a comprehensive
record of the user’s online activity. The data is then
transmitted to an external server controlled by the attacker.
The permissions required include history, tabs, script-
ing, and storage. Figure 4 demonstrates this extension’s
activity.
The Auto-Like YouTube Videos extension demon- Unauthorized camera access remains a significant
strates how browser extensions can manipulate engage- privacy threat posed by malicious browser extensions.
ment metrics on social media platforms. This manipula- This extension demonstrates how an attacker can exploit
tion affects content ranking algorithms and distorts user navigator.mediaDevices.getUserMedia to activate a user’s
engagement patterns. camera without explicit consent.
The extension monitors YouTube pages for video el- Upon installation, the extension injects JavaScript
ements and automatically triggers a “Like” action when into webpages using chrome.scripting.executeScript
a user hovers over a video thumbnail. It does this using (Chrome) or browser.scripting.executeScript
document.querySelector to detect the YouTube like but- (Firefox) [18], ensuring it runs persistently in the
ton and executes a simulated click event. The extension background. The extension listens for browser
employs MutationObserver [24] to ensure the auto-like events using chrome.tabs.onUpdated.addListener or
functionality persists across dynamic page changes. This browser.tabs.onUpdated.addListener, allowing it to
method can be leveraged by malicious actors to artificially activate the camera each time the user loads a webpage.
inflate video rankings and influence recommendations. Once triggered, it automatically enables video recording
The required permissions include tabs, activeTab, and streams the feed to an external server.
scripting, and storage. Figure 5 illustrates this behavior. While Chrome and Firefox enforce user permission
requests for media access, extensions with broad per-
missions can manipulate these settings post-installation,
creating a persistent security risk. Figure 7 illustrates this
exploit.
and dynamic analysis tools, and enhanced monitoring particularly in Firefox’s review process, by integrating en-
mechanisms to prevent unauthorized access to user data hanced static and dynamic analysis techniques capable of
and mitigate the risks posed by malicious extensions. detecting obfuscation and hidden payloads. Additionally,
real-time monitoring mechanisms should be implemented
6. Conclusions to detect behavioral anomalies even after an extension has
been approved. Ensuring that updates to extensions un-
Browser extensions, while offering enhanced function- dergo rigorous security checks, rather than relying solely
ality, pose a significant threat to user privacy and security on pre-approval evaluations, is crucial for mitigating post-
due to their vulnerabilities. This study has demonstrated publication risks. Simultaneously, users must be educated
how malicious browser extensions can exploit minimal on the dangers posed by browser extensions and encour-
permissions to execute attacks such as data theft, surveil- aged to grant permissions judiciously.
lance, and unauthorized content manipulation. A key find- Future research should focus on improving real-time
ing is the disparity between Chrome and Firefox in de- behavioral analysis of browser extensions, refining per-
tecting and mitigating these threats. While Chrome’s Web mission models, and establishing industry-wide vetting
Store enforces stricter security measures, blocking many standards to mitigate these persistent threats. In particu-
high-risk behaviors such as unauthorized cookie access lar, developing sophisticated anomaly detection techniques
and keystroke logging, Firefox’s Add-ons Store remains and fostering collaboration between browser vendors, se-
more susceptible to bypassing techniques, particularly curity researchers, and policymakers can enhance the ef-
when malicious behavior is obfuscated within seemingly fectiveness of existing defenses. Standardizing permission
benign extensions. transparency and incorporating automated rollback mech-
Alarmingly, despite extensive research, the solutions anisms for post-publication updates will be critical steps
proposed by the academic and cybersecurity community in strengthening browser extension security. Ultimately,
are rarely implemented in real-world scenarios. The ability bridging the gap between theoretical security measures
of attackers to disguise malicious intent within productiv- and their real-world implementation is essential. Without
ity or customization tools highlights critical weaknesses in proactive efforts from the industry and researchers, ma-
the current extension vetting process. Moreover, creating licious extensions will continue to exploit vulnerabilities,
and distributing malicious extensions remains alarmingly posing a persistent threat to the digital ecosystem.
simple, and current security measures fail to address the
risks posed by post-publication modifications. Once an
extension is approved and published, there is little over- References
sight ensuring that subsequent updates do not introduce
malicious functionalities. This gap in continuous security
[1] BrowserStack, ”Understanding browser market share,” 2024.
monitoring exposes users to persistent cyber threats. [Online]. Available: https://www.browserstack.com/guide/
Addressing these challenges requires a multi-faceted understanding-browser-market-share#:∼:text=in%20their%
approach. Browser vendors must enforce stricter policies, 20positions.. [Accessed: Jan. 8, 2025].
[2] A. Bridgwater, ”How browser extensions work,” *Forbes*, [17] Google Developers, ”Chrome Extension Cookies API,” 2024.
Apr. 16, 2019. [Online]. Available: https://www.forbes.com/sites/ [Online]. Available: https://developer.chrome.com/docs/extensions/
adrianbridgwater/2019/04/16/how-browser-extensions-work/. [Ac- reference/api/cookies. [Accessed: Jan. 8, 2025].
cessed: Jan. 8, 2025]. [18] Google Developers, ”Chrome Extension Tabs API,” 2024. [Online].
[3] J. Corpuz, ”41 best Google Chrome extensions,” *Tom’s Available: https://developer.chrome.com/docs/extensions/reference/
Guide*, 2017. [Online]. Available: https://www.tomsguide. api/tabs. [Accessed: Jan. 8, 2025].
com/us/pictures-story/283-best-google-chrome-extensions.html. [19] P. Tuli and P. Sahu, ”System monitoring and security using key-
[Accessed: Jan. 8, 2025]. logger,” Int. J. Comput. Sci. Mobile Comput., vol. 2, pp. 106–111,
[4] Trend Micro, “ParaSiteSnatcher: How Malicious Chrome 2013.
Extensions Target Brazil,” Dec. 2023. [Online]. Avail- [20] I. Kantor, ”Keyboard: keydown and keyup,” 2017. [Online].
able: https://www.trendmicro.com/en in/research/23/k/ Available: https://javascript.info/keyboard-events. [Accessed: Jan.
parasitesnatcher-how-malicious-chrome-extensions-target-brazil-. 8, 2025].
html [21] Google Developers, ”Chrome Extension Runtime API,” 2024.
[5] Cyberhaven Engineering Team, ”Cyberhaven’s Preliminary [Online]. Available: https://developer.chrome.com/docs/extensions/
Analysis of the Recent Malicious Chrome Extension,” reference/api/runtime. [Accessed: Jan. 8, 2025].
Cyberhaven Engineering Blog. [Online]. Available: [22] Google Developers, ”Chrome Extension History API,” 2024.
https://www.cyberhaven.com/engineering-blog/cyberhavens- [Online]. Available: https://developer.chrome.com/docs/extensions/
preliminary-analysis-of-the-recent-malicious-chrome-extension. reference/api/history. [Accessed: Jan. 8, 2025].
[Accessed: Jan. 9, 2025].
[23] Google Developers, ”Chrome Extension Scripting API,” 2024.
[6] SoyaCincau, ”Chrome Extension AdBlocker Infected [Online]. Available: https://developer.chrome.com/docs/extensions/
with Malware – Nano Adblocker and Nano Defender,” reference/api/scripting. [Accessed: Jan. 8, 2025].
SoyaCincau, Oct. 21, 2020. [Online]. Available:
https://soyacincau.com/2020/10/21/chrome-extension-adblocker- [24] MDN Web Docs, ”MutationObserver,” 2024. [Online].
infected-malware-nano-adblocker-nano-defender/. [Accessed: Jan. Available: https://developer.mozilla.org/en-US/docs/Web/API/
9, 2025]. MutationObserver. [Accessed: Jan. 8, 2025].
[25] SquareX, ”Millions of enterprises at risk: SquareX
[7] The Hacker News, ”Warning: Hugely Popular ’Great Suspender’
shows how malicious extensions bypass Google’s MV3
Chrome Extension Found Spreading Malware,” The Hacker News,
restrictions,” presented at DEF CON 32, Oct. 2024.
Feb. 2021. [Online]. Available: https://thehackernews.com/2021/
[Online]. Available:https://www.globenewswire.com/news-
02/warning-hugely-popular-great-suspender.html. [Accessed: Jan.
release/2024/10/03/2957857/0/en/Millions-of-Enterprises-at-
9, 2025].
Risk-SquareX-Shows-How-Malicious-Extensions-Bypass-Google-
[8] The Hacker News, ”16 Chrome Extensions Hacked, Exposing s-MV3-Restrictions.htmll
Millions of Users to Malicious Attacks,” The Hacker News, Dec.
[26] BleepingComputer, ”New details reveal how hackers hijacked
16, 2024. [Online]. Available: https://thehackernews.com/2024/12/
35 Google Chrome extensions,” 2024. [Online]. Available:
16-chrome-extensions-hacked-exposing.html. [Accessed: Jan. 9,
https://www.bleepingcomputer.com/news/security/new-details-
2025].
reveal-how-hackers-hijacked-35-google-chrome-extensions/.
[9] Ars Technica, ”Popular Chromium Ad Blockers Caught Stealing [Accessed: Jan. 8, 2025].
User Data and Accessing Accounts,” Ars Technica, Oct. [27] Y. Wang, W. Cai, P. Lyu, and W. Shao, Detecting malicious browser
2020. [Online]. Available: https://arstechnica.com/information- extensions, Northwestern Polytechnical University, Xi’an, 2018.
technology/2020/10/popular-chromium-ad-blockers-caught-
stealing-user-data-and-accessing-accounts. [Accessed: Jan. 9, [28] K. Kaushik, S. Aggarwal, S. Pandey, S. Mudgal, and S. Garg,
2025]. Investigating and safeguarding the web browsers from malicious
web extensions, Univ. Petroleum Energy Studies, Dehradun, India,
[10] Field Effect, ”33 Chrome Extensions Found to Be Malicious,” 2021.
Field Effect Blog. [Online]. Available: https://fieldeffect.com/blog/
33-chrome-extensions-found-to-be-malicious. [Accessed: Jan. 9, [29] G. Varshney and M. Misra, Browshing: A new way of phishing us-
2025]. ing a malicious browser extension, Indian Inst. Technol., Roorkee,
India, 2016.
[11] M. Maunder, ”PSA: 4.8 million affected by Chrome exten-
sion attacks targeting site owners,” *Wordfence Blog*, Aug. 17, [30] A. Kapravelos, C. Grier, N. Chachra, C. Kruegel, G. Vigna, and V.
2017. [Online]. Available: https://www.wordfence.com/blog/2017/ Paxson, Hulk: Eliciting malicious behavior in browser extensions,
08/chrome-browser-extension-attacks/. [Accessed: Jan. 8, 2025]. Univ. California Santa Barbara, Berkeley, San Diego, 2018.
[12] D. Price, ”4 malicious browser extensions that help [31] H. Shahriar, K. Weldemariam, M. Zulkernine, and T. Lutellier,
hackers target their victims,” *MakeUseOf*, Jul. 13, Effective detection of vulnerable and malicious browser extensions,
2015. [Online]. Available: http://www.makeuseof.com/tag/ 2018.
x-malicious-browser-extensions-help-hackers-target-victims/. [32] N. Pantelaios, N. Nikiforakis, and A. Kapravelos, You’veChanged:
[Accessed: Jan. 8, 2025]. Detecting malicious browser extensions through their update
deltas, North Carolina State Univ., Stony Brook Univ., 2017.
[13] G. Varshney, S. Bagade, and S. Sinha, ”Malicious browser ex-
tensions: A growing threat: A case study on Google Chrome: [33] M. Maunder, “PSA: 4.8 Million Affected by Chrome Ex-
Ongoing work in progress,” in Proc. Int. Conf. Information Net- tension Attacks Targeting Site Owners,” Wordfence Blog,
working (ICOIN), Chiang Mai, Thailand, 2018, pp. 188–193. Aug. 2017. Available: https://www.wordfence.com/blog/2017/08/
doi: 10.1109/ICOIN.2018.8343108. [Online]. Available: https:// chrome-browser-extension-attacks/
ieeexplore.ieee.org/document/8343108. [34] J. M. Moreno, N. Vallina-Rodriguez, and J. Tapiador, “Did
[14] Google, ”Staying safe with Chrome extensions,” Google Security I Vet You Before? Assessing the Chrome Web Store Vet-
Blog, Jun. 20, 2024. [Online]. Available: https://security. ting Process through Browser Extension Similarity,” arXiv
googleblog.com/2024/06/staying-safe-with-chrome-extensions. preprint arXiv:2406.00374, 2024. Available: https://arxiv.org/abs/
html. [Accessed: Jan. 8, 2025]. 2406.00374
[15] G. Varshney, M. Misra, and P. K. Atrey, ”Cyberattacks via Google [35] Google Chrome Web Store, ”YouTube Fo-
Chrome browser extensions,” in World Scientific Reference on cus Timer & Stats,” 2025. [Online]. Available:
Innovation, Chapter 9, pp. 193–210, 2024. [Online]. Available: https://chromewebstore.google.com/detail/ejmfemchnobpkbmnidhb
https://doi.org/10.1142/9789813149106 0009. [Accessed: Jan. 8, bledmajpehnp. [Accessed: Mar. 6, 2025].
2025]. [36] Mozilla Add-ons, ”Focus Timer - Stay Productive,” 2025. [Online].
[16] W. Chang and S. Chen, ”Extension Board: Towards runtime Available: https://addons.mozilla.org/en-US/firefox/addon/focus-
browser extension information leakage detection,” in Proc. IEEE timer-stay-productive/. [Accessed: Mar. 6, 2025].
Conf. Commun. Netw. Security (CNS), 2016. [Online]. Available: [37] Mozilla Add-ons, ”Easy To-Do List,” 2025. [Online]. Available:
https://ieeexplore.ieee.org/document/7860481. [Accessed: Jan. 8, https://addons.mozilla.org/en-US/firefox/addon/easy-to-do-list/.
2025]. [Accessed: Mar. 6, 2025].