{"id":"https://openalex.org/W4399837792","doi":"https://doi.org/10.1145/3634737.3637636","title":"What is in the Chrome Web Store?","display_name":"What is in the Chrome Web Store?","publication_year":2024,"publication_date":"2024-06-28","ids":{"openalex":"https://openalex.org/W4399837792","doi":"https://doi.org/10.1145/3634737.3637636"},"language":"en","primary_location":{"id":"doi:10.1145/3634737.3637636","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3634737.3637636","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2406.12710","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088048434","display_name":"Sheryl Hsu","orcid":"https://orcid.org/0000-0002-7298-6783"},"institutions":[{"id":"https://openalex.org/I97018004","display_name":"Stanford University","ror":"https://ror.org/00f54p054","country_code":"US","type":"education","lineage":["https://openalex.org/I97018004"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sheryl Hsu","raw_affiliation_strings":["Stanford University, Stanford, USA"],"raw_orcid":"https://orcid.org/0000-0002-7298-6783","affiliations":[{"raw_affiliation_string":"Stanford University, Stanford, USA","institution_ids":["https://openalex.org/I97018004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054775223","display_name":"Manda Tran","orcid":"https://orcid.org/0009-0005-5226-1856"},"institutions":[{"id":"https://openalex.org/I97018004","display_name":"Stanford University","ror":"https://ror.org/00f54p054","country_code":"US","type":"education","lineage":["https://openalex.org/I97018004"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Manda Tran","raw_affiliation_strings":["Stanford University, Stanford, USA"],"raw_orcid":"https://orcid.org/0009-0005-5226-1856","affiliations":[{"raw_affiliation_string":"Stanford University, Stanford, USA","institution_ids":["https://openalex.org/I97018004"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037725779","display_name":"Aurore Fass","orcid":"https://orcid.org/0000-0001-6611-4447"},"institutions":[{"id":"https://openalex.org/I97018004","display_name":"Stanford University","ror":"https://ror.org/00f54p054","country_code":"US","type":"education","lineage":["https://openalex.org/I97018004"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Aurore Fass","raw_affiliation_strings":["Stanford University, CISPA Helmholtz Center for Information Security, Stanford, USA"],"raw_orcid":"https://orcid.org/0000-0001-6611-4447","affiliations":[{"raw_affiliation_string":"Stanford University, CISPA Helmholtz Center for Information Security, Stanford, USA","institution_ids":["https://openalex.org/I97018004"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5088048434"],"corresponding_institution_ids":["https://openalex.org/I97018004"],"apc_list":null,"apc_paid":null,"fwci":5.9328,"has_fulltext":true,"cited_by_count":8,"citation_normalized_percentile":{"value":0.96169915,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"785","last_page":"798"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12016","display_name":"Web Data Mining and Analysis","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reuse","display_name":"Reuse","score":0.7123662233352661},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7116202116012573},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.6690154075622559},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5593231916427612},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5513043403625488},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.4584715962409973},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3822641968727112},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.17163830995559692},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1369551718235016},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09996220469474792},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.0780753493309021}],"concepts":[{"id":"https://openalex.org/C206588197","wikidata":"https://www.wikidata.org/wiki/Q846574","display_name":"Reuse","level":2,"score":0.7123662233352661},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7116202116012573},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.6690154075622559},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5593231916427612},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5513043403625488},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.4584715962409973},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3822641968727112},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.17163830995559692},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1369551718235016},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09996220469474792},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.0780753493309021},{"id":"https://openalex.org/C548081761","wikidata":"https://www.wikidata.org/wiki/Q180388","display_name":"Waste management","level":1,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3634737.3637636","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3634737.3637636","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2406.12710","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2406.12710","pdf_url":"https://arxiv.org/pdf/2406.12710","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-sa","license_id":"https://openalex.org/licenses/cc-by-nc-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2406.12710","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2406.12710","pdf_url":"https://arxiv.org/pdf/2406.12710","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-sa","license_id":"https://openalex.org/licenses/cc-by-nc-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"display_name":"Responsible consumption and production","id":"https://metadata.un.org/sdg/12","score":0.46000000834465027}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4399837792.pdf","grobid_xml":"https://content.openalex.org/works/W4399837792.grobid-xml"},"referenced_works_count":19,"referenced_works":["https://openalex.org/W2091747079","https://openalex.org/W2294912735","https://openalex.org/W2578355414","https://openalex.org/W2602351626","https://openalex.org/W2604188240","https://openalex.org/W2614073125","https://openalex.org/W2771281827","https://openalex.org/W2800651024","https://openalex.org/W2963070438","https://openalex.org/W2970044827","https://openalex.org/W2970323597","https://openalex.org/W3104970816","https://openalex.org/W3110204761","https://openalex.org/W3147673361","https://openalex.org/W4288057765","https://openalex.org/W4299301436","https://openalex.org/W4308643045","https://openalex.org/W4308643562","https://openalex.org/W4384948702"],"related_works":["https://openalex.org/W2384475851","https://openalex.org/W2000444236","https://openalex.org/W2353602216","https://openalex.org/W2367078749","https://openalex.org/W2381798600","https://openalex.org/W1910583078","https://openalex.org/W2351618306","https://openalex.org/W2133117170","https://openalex.org/W2999162218","https://openalex.org/W1537443268"],"abstract_inverted_index":{"This":[0],"paper":[1],"is":[2],"the":[3,12,29,37,50,70,128,144,148,151,159,168,198],"first":[4,35],"attempt":[5],"at":[6],"providing":[7],"a":[8,65,87,138,177,201],"holistic":[9],"view":[10],"of":[11,42,46,84,130,141,147,158,179],"Chrome":[13],"Web":[14],"Store":[15],"(CWS).":[16],"We":[17,34,91,185],"leverage":[18],"historical":[19],"data":[20],"provided":[21],"by":[22],"ChromeStats":[23],"to":[24,100,108,127,162,196],"study":[25],"global":[26],"trends":[27],"in":[28,49,143,150,167,194],"CWS":[30,51,71,152,169],"and":[31,58,74,133,170],"security":[32],"implications.":[33],"highlight":[36],"extremely":[38],"short":[39],"life":[40],"cycles":[41],"extensions:":[43],"roughly":[44],"60%":[45,146],"extensions":[47,85,117,149,160,180],"stay":[48],"for":[52,72,200],"one":[53],"year.":[54],"Second,":[55],"we":[56,81,114,136],"define":[57],"show":[59,115],"that":[60,116,187],"Security-Noteworthy":[61],"Extensions":[62],"(SNE)":[63],"are":[64,165],"significant":[66],"issue:":[67],"they":[68],"pervade":[69],"years":[73,174],"affect":[75],"almost":[76],"350":[77],"million":[78],"users.":[79],"Third,":[80],"identify":[82],"clusters":[83],"with":[86],"similar":[88],"code":[89,94,119,132],"base.":[90],"discuss":[92],"how":[93],"similarity":[95],"techniques":[96],"could":[97],"be":[98,163,191],"used":[99],"flag":[101],"suspicious":[102],"extensions.":[103],"By":[104],"developing":[105],"an":[106],"approach":[107],"extract":[109],"URLs":[110],"from":[111,121],"extensions'":[112],"comments,":[113],"reuse":[118],"snippets":[120],"public":[122],"repositories":[123],"or":[124],"forums,":[125],"leading":[126],"propagation":[129],"dated":[131],"vulnerabilities.":[134],"Finally,":[135],"underline":[137],"critical":[139],"lack":[140],"maintenance":[142],"CWS:":[145],"have":[153],"never":[154],"been":[155],"updated;":[156],"half":[157],"known":[161,193],"vulnerable":[164,172,182],"still":[166,171],"2":[173],"after":[175],"disclosure;":[176],"third":[178],"use":[181],"library":[183],"versions.":[184],"believe":[186],"these":[188],"issues":[189],"should":[190],"widely":[192],"order":[195],"pave":[197],"way":[199],"more":[202],"secure":[203],"CWS.":[204]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":3}],"updated_date":"2026-04-28T14:05:53.105641","created_date":"2024-06-20T00:00:00"}
