Mozilla Firefox provides third-party developers with a framework for writing extensions to add functionality to the browser. Extensions have unfettered access to browser privileges: extensions can snoop on web content, delete files from the hard drive, and even launch new processes from arbitrary binaries. Extensions might be intentionally malicious (i.e., a user unknowingly installs browser malware) or they might accidentally leak privileges to malicious web sites. It would be desirable to limit the powers of extensions, but we also do not want to cripple the extension framework too severely. Here, we review twenty-five "recommended" Firefox extensions to provide a basis for the discussion of legacy extensions' interface needs. Notably, we find that very few extensions need access to the file system or system calls despite the fact that all extensions have this ability.
Title
A Survey of Firefox Extension API Use
Published
EECS Department, University of California, University of California at Berkeley, Berkeley, California, October 16, 2009
Full Collection Name
Electrical Engineering & Computer Sciences Technical Reports
Other Identifiers
EECS-2009-139
Type
Text
Extent
11 p
Archive
The Engineering Library
Usage Statement
Researchers may make free and open use of the UC Berkeley Library’s digitized public domain materials. However, some materials in our online collections may be protected by U.S. copyright law (Title 17, U.S.C.). Use or reproduction of materials protected by copyright beyond that allowed by fair use (Title 17, U.S.C. § 107) requires permission from the copyright owners. The use or reproduction of some materials may also be restricted by terms of University of California gift or purchase agreements, privacy and publicity rights, or trademark law. Responsibility for determining rights status and permissibility of any use or reproduction rests exclusively with the researcher. To learn more or make inquiries, please see our permissions policies (https://www.lib.berkeley.edu/about/permissions-policies).