From Manifest V2 to V3: A Study on the Discoverability of Chrome Extensions

Valerio Bucci* (Corresponding Author), Wanpeng Li

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

3 Downloads (Pure)

Abstract

Browser extensions allow users to customise and improve their web browsing experience. The Manifest protocol was introduced to mitigate the risk of accidental vulnerabilities in extensions, introduced by inexperienced developers. In Manifest V2, the introduction of web accessible resources (WARs) limited the exposure of extension files to web pages, thereby reducing the potential for exploitation by malicious actors, which was a significant risk in the previous unrestricted access model. Building on this, Manifest V3 coupled WARs with match patterns, allowing extension developers to precisely define which websites can interact with their extensions, thereby limiting unintended exposures and reducing potential privacy risks associated with websites detecting user-installed extensions. In this paper, we investigate the impact of Manifest V3 on WAR-enabled extension discovery by providing an empirical study of the Chrome Web Store. We collected and analysed 108,416 extensions and found that Manifest V3 produces a relative reduction in WAR detectability ranging between 4% and 10%, with popular extensions exhibiting a higher impact. Additionally, our study revealed that 30.78% of extensions already transitioned to Manifest V3. Finally, we implemented X-Probe, a live demonstrator showcasing WAR-enabled discovery. Our evaluation shows that our demonstrator can detect 22.74% of Manifest V2 and 18.3% of Manifest V3 extensions. Moreover, within the 1000 most popular extensions, the detection rates rise to a substantial 58.07% and 47.61%, respectively. In conclusion, our research shows that developers commonly associate broad match patterns to their WARs either because of poor security practices, or due to the inherent functional requirements of their extensions.
Original languageEnglish
Title of host publicationLecture Notes in Computer Science
EditorsE. Athanasopoulos, B. Mennink
PublisherSpringer
Pages183–202
Number of pages19
Volume14411
ISBN (Electronic)978-3-031-49187-0
ISBN (Print)978-3-031-49186-3
DOIs
Publication statusPublished - 1 Dec 2023
EventISC 2023: Information Security Conference - Paviljoen Sterrebos, Groningen, Netherlands
Duration: 15 Nov 202317 Nov 2023
Conference number: 26th
https://isc23.cs.rug.nl/docs/home/

Publication series

NameLecture Notes in Computer Science (LNCS)
PublisherSpringer
ISSN (Print)1611-3349
ISSN (Electronic)1611-3349

Conference

ConferenceISC 2023
Abbreviated titleISC
Country/TerritoryNetherlands
CityGroningen
Period15/11/2317/11/23
Internet address

Keywords

  • Browser extension fingerprinting
  • Web-accesible resources
  • Brower extension detection

Fingerprint

Dive into the research topics of 'From Manifest V2 to V3: A Study on the Discoverability of Chrome Extensions'. Together they form a unique fingerprint.

Cite this