{"id":"https://openalex.org/W4310588383","doi":"https://doi.org/10.1145/3564625.3567988","title":"No Signal Left to Chance: Driving Browser Extension Analysis by Download Patterns","display_name":"No Signal Left to Chance: Driving Browser Extension Analysis by Download Patterns","publication_year":2022,"publication_date":"2022-12-03","ids":{"openalex":"https://openalex.org/W4310588383","doi":"https://doi.org/10.1145/3564625.3567988"},"language":"en","primary_location":{"id":"doi:10.1145/3564625.3567988","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3564625.3567988","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 38th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3564625.3567988","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049154753","display_name":"Pablo Picazo\u2010Sanchez","orcid":"https://orcid.org/0000-0002-0303-3858"},"institutions":[{"id":"https://openalex.org/I66862912","display_name":"Chalmers University of Technology","ror":"https://ror.org/040wg7k59","country_code":"SE","type":"education","lineage":["https://openalex.org/I66862912"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Pablo Picazo-Sanchez","raw_affiliation_strings":["Chalmers University of Technology, Sweden"],"affiliations":[{"raw_affiliation_string":"Chalmers University of Technology, Sweden","institution_ids":["https://openalex.org/I66862912"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030086378","display_name":"Benjamin Eriksson","orcid":"https://orcid.org/0000-0003-0553-3597"},"institutions":[{"id":"https://openalex.org/I66862912","display_name":"Chalmers University of Technology","ror":"https://ror.org/040wg7k59","country_code":"SE","type":"education","lineage":["https://openalex.org/I66862912"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Benjamin Eriksson","raw_affiliation_strings":["Chalmers University of Technology, Sweden"],"affiliations":[{"raw_affiliation_string":"Chalmers University of Technology, Sweden","institution_ids":["https://openalex.org/I66862912"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070340953","display_name":"Andrei Sabelfeld","orcid":null},"institutions":[{"id":"https://openalex.org/I66862912","display_name":"Chalmers University of Technology","ror":"https://ror.org/040wg7k59","country_code":"SE","type":"education","lineage":["https://openalex.org/I66862912"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Andrei Sabelfeld","raw_affiliation_strings":["Chalmers University of Technology, Sweden"],"affiliations":[{"raw_affiliation_string":"Chalmers University of Technology, Sweden","institution_ids":["https://openalex.org/I66862912"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5049154753"],"corresponding_institution_ids":["https://openalex.org/I66862912"],"apc_list":null,"apc_paid":null,"fwci":2.122,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.90050565,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"896","last_page":"910"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12016","display_name":"Web Data Mining and Analysis","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12016","display_name":"Web Data Mining and Analysis","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9871000051498413,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9776999950408936,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8345146775245667},{"id":"https://openalex.org/keywords/download","display_name":"Download","score":0.7381475567817688},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5534331798553467},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.5155684947967529},{"id":"https://openalex.org/keywords/web-page","display_name":"Web page","score":0.4911775290966034},{"id":"https://openalex.org/keywords/web-navigation","display_name":"Web navigation","score":0.4655265212059021},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4442751407623291},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3899364471435547}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8345146775245667},{"id":"https://openalex.org/C2780154274","wikidata":"https://www.wikidata.org/wiki/Q7126717","display_name":"Download","level":2,"score":0.7381475567817688},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5534331798553467},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.5155684947967529},{"id":"https://openalex.org/C21959979","wikidata":"https://www.wikidata.org/wiki/Q36774","display_name":"Web page","level":2,"score":0.4911775290966034},{"id":"https://openalex.org/C61096286","wikidata":"https://www.wikidata.org/wiki/Q7978592","display_name":"Web navigation","level":3,"score":0.4655265212059021},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4442751407623291},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3899364471435547}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3564625.3567988","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3564625.3567988","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 38th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:research.chalmers.se:533846","is_oa":false,"landing_page_url":"https://research.chalmers.se/en/publication/533846","pdf_url":null,"source":{"id":"https://openalex.org/S4306402469","display_name":"Chalmers Research (Chalmers University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I66862912","host_organization_name":"Chalmers University of Technology","host_organization_lineage":["https://openalex.org/I66862912"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":{"id":"doi:10.1145/3564625.3567988","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3564625.3567988","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 38th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W1527892","https://openalex.org/W1480813933","https://openalex.org/W1852822942","https://openalex.org/W1894414046","https://openalex.org/W1982042804","https://openalex.org/W2000855935","https://openalex.org/W2020571458","https://openalex.org/W2037537012","https://openalex.org/W2046529117","https://openalex.org/W2098759488","https://openalex.org/W2169771430","https://openalex.org/W2258082031","https://openalex.org/W2408821405","https://openalex.org/W2514898741","https://openalex.org/W2599937196","https://openalex.org/W2604188240","https://openalex.org/W2613314732","https://openalex.org/W2810845273","https://openalex.org/W2892160417","https://openalex.org/W2955034357","https://openalex.org/W2963070438","https://openalex.org/W2964194794","https://openalex.org/W2964326168","https://openalex.org/W2982438846","https://openalex.org/W2987064932","https://openalex.org/W2990338521","https://openalex.org/W3015392158","https://openalex.org/W3015481738","https://openalex.org/W3031339255","https://openalex.org/W3039352388","https://openalex.org/W3042807565","https://openalex.org/W3091580460","https://openalex.org/W3098204138","https://openalex.org/W3100514082","https://openalex.org/W3101291735","https://openalex.org/W3112330479","https://openalex.org/W3154732898","https://openalex.org/W3156766660","https://openalex.org/W3175142666","https://openalex.org/W3190461479","https://openalex.org/W3210939414","https://openalex.org/W4213308533","https://openalex.org/W4229007013","https://openalex.org/W6950192780"],"related_works":["https://openalex.org/W1541158057","https://openalex.org/W2017818230","https://openalex.org/W2626548695","https://openalex.org/W1519586109","https://openalex.org/W2030268420","https://openalex.org/W2548348270","https://openalex.org/W2885559332","https://openalex.org/W2155924377","https://openalex.org/W2055154498","https://openalex.org/W2051097555"],"abstract_inverted_index":{"Browser":[0],"extensions":[1,16,42,75,88,121,157,225,233],"are":[2],"popular":[3],"small":[4],"applications":[5],"that":[6,86,98,144,243],"allow":[7],"users":[8],"to":[9,118,152,161,188,203],"enrich":[10],"their":[11,78],"browsing":[12],"experience.":[13],"Yet":[14],"browser":[15,50,67],"pose":[17],"security":[18,141],"concerns":[19],"because":[20],"they":[21],"can":[22,37,103,149],"leak":[23],"user":[24],"data":[25],"and":[26,52,158,198,214],"maliciously":[27],"act":[28],"on":[29,77,123,174,217,238],"behalf":[30],"of":[31,127,164,171,181,192,201,221],"the":[32,47,99,124,130,145,169,182,190,227,253],"user.":[33],"Because":[34],"malicious":[35,41,108,120,156,208,235,263],"behavior":[36],"manifest":[38],"dynamically,":[39],"detecting":[40,231],"remains":[43],"a":[44,62,83,115,175,178,218,256],"challenge":[45],"for":[46,65,73,106],"research":[48],"community,":[49],"vendors,":[51],"web":[53],"application":[54],"developers.":[55],"This":[56,134],"paper":[57],"identifies":[58],"download":[59,79,92,100,146],"patterns":[60,147],"as":[61,159,234,255],"useful":[63],"signal":[64,102,148,247],"analyzing":[66],"extensions.":[68,109,166,209,264],"We":[69,167,194,210],"leverage":[70],"machine":[71,138],"learning":[72,139],"clustering":[74],"based":[76,122,237],"patterns,":[80],"confirming":[81],"at":[82,205],"large":[84],"scale":[85],"many":[87],"follow":[89],"strikingly":[90],"similar":[91],"patterns.":[93],"Our":[94],"key":[95],"insight":[96],"is":[97],"pattern":[101],"be":[104,150],"used":[105,151],"identifying":[107],"To":[110],"this":[111,246],"end,":[112],"we":[113,241,258],"present":[114],"novel":[116],"technique":[117,135],"detect":[119],"public":[125],"number":[126,191],"downloads":[128],"in":[129,226],"Chrome":[131],"Web":[132,183,228],"Store.":[133],"fruitfully":[136],"combines":[137],"with":[140,248],"analysis,":[142,251],"showing":[143],"both":[153],"directly":[154],"spot":[155],"input":[160],"subsequent":[162],"analysis":[163],"suspicious":[165],"demonstrate":[168],"benefits":[170],"our":[172,212],"approach":[173],"dataset":[176],"from":[177],"daily":[179],"crawl":[180],"Store":[184,229],"over":[185],"6":[186],"months":[187],"track":[189],"downloads.":[193,239],"find":[195,259],"135":[196],"clusters":[197],"identify":[199],"61":[200],"them":[202],"have":[204],"least":[206],"80%":[207],"train":[211],"classifier":[213],"run":[215],"it":[216],"test":[219],"set":[220],"1,212":[222],"currently":[223],"active":[224],"successfully":[230],"326":[232,254],"solely":[236],"Further,":[240],"show":[242],"by":[244],"combining":[245],"code":[249],"similarity":[250],"using":[252],"seed,":[257],"an":[260],"additional":[261],"6,579":[262]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
