Mystique - Uncovering Information Leakage from Browser Extensions
Association for Computing Machinery (ACM) via YouTube
UC San Diego Product Management Certificate — AI-Powered PM Training
Python, Prompt Engineering, Data Science — Build the Skills Employers Want Now
Overview
Syllabus
Intro
Browser Extensions
Motivating Example
Privacy Implications
Goals
Overview
Approach
Taint Tracking: Challenges
Addressing the Challenges: V8
Data Flow Graph (DFG)
Control-Flow Dependencies
Implicit Data Flows
Completing the Example
Taint Propagation Points
Estimating True Positive Rates
Number of Affected Users
The SimilarWeb Library
Web of Trust
Limitations
Open-sourcing Mystique
Conclusion
Taught by
Association for Computing Machinery (ACM)