This repository contains data and code for SIGMETRICS 2023 accepted paper: Characterizing Cryptocurrency-themed Malicious Browser Extensions
There are 186 malicious extensions in total located in the directory:
./malicious_extensions
Five subdirectories divide those extensions into five categories: phishing, mining, scam, adware and gambling.
There are 3600 cryptocurrency-themed browser extensions in 6 official web stores(chrome, firefox, opera, edge, 360, whale) and 3 third-party extension stores(crx4chrome, guge, haoyong), located in the directory:
./all_extensions/[store name]
Besides, we maintain a set of extensions which are all removed by official auditting and checking, located in the directory:
./all_extensions/[store_name]_removed_by_store
We open the source code for the detection of malicious extensions including crawlers, preliminary analysis, suspicious extension detection and malicious extension confirmation.
There are 6 crawlers running in the server while 3 in official extension stores (chrome, firefox, opera) and 3 in third-party extension stores (guge, crx4chrome, haoyong), located in the directory:
./source_code/crawlers
Preliminary analysis includes VirousTotal scanning, and filtering by download numbers, negative reviews and low ratings, located in the directory:
./source_code/preliminary_analysis
Suspicious extension detection includes permission and AST feature extraction, located in the directory:
./source_code/static_analysis
Malicious extension confirmation includes automatical collection of runtime behavior features (system-level behaviors and network-level behaviors), located in the directory:
./source_code/dynamic_analysis