
INTERNATIONAL JOURNAL OF LATEST TECHNOLOGY IN ENGINEERING,
MANAGEMENT & APPLIED SCIENCE (IJLTEMAS)
ISSN 2278-2540 | DOI: 10.51583/IJLTEMAS | Volume XV, Issue I, January 2026
www.rsisinternational.org
explicitly designed as a decision-support tool rather than an autonomous enforcement mechanism. It provides
interpretable risk indicators and evidence-based warnings, avoiding automatic removal or punitive actions
without user involvement.
Preservation of User Autonomy:
The framework prioritizes transparency and informed decision-making while avoiding paternalistic control.
Users retain full authority over installation and removal decisions, ensuring that security guidance enhances
awareness without undermining user agency. This approach balances protective intervention with respect for
individual choice.
CONCLUSION AND FUTURE SCOPE
This paper presented a robust, hybrid framework for the detection of malicious Google Chrome extensions,
addressing the critical security gaps inherent in browser-based sandboxing. By strictly coupling a heuristic
permission risk scoring model with a local threat intelligence database, the proposed system overcomes the
latency and privacy concerns associated with traditional cloud-based analysis.
The experimental evaluation confirms the efficacy of this hybrid approach. The system achieved an F1-Score of
0.83, effectively mitigating the high false-positive rates observed in standalone permission-based methods while
maintaining the detection accuracy of signature-based systems. Crucially, the implementation validates that
computationally efficient, privacy-preserving malware detection is feasible on the client side.
Future work will focus on integrating Supervised Machine Learning classifiers to replace static thresholds and
developing a dynamic analysis module to detect runtime obfuscation and logic bombs, further hardening the
browser against sophisticated attacks.
REFERENCES:
1. A. Aggarwal, R. Dallaway, and J. Oberheide, “I Spy with My Little Eye: Analysis and Detection
of Spying Browser Extensions,” in Proc. Network and Distributed System Security Symp. (NDSS),
2017.
2. E. Toreini, B. Crispo, and M. Conti, “DOMtegrity: Ensuring Web Page Integrity Against
Malicious Browser Extensions,” in Proc. ACM Conf. on Computer and Communications Security
(CCS), 2019.
3. A. Kapravelos et al., “Exposing Malicious Browser Extensions,” in Proc. Network and Distributed
System Security Symp. (NDSS), 2014.
4. D. Thomas, A. Bates, and E. Gerber, “Analyzing Permission Usage Patterns in Browser
Extensions,” IEEE Security & Privacy, vol. 16, no. 4, pp. 34–43, 2018.
5. G. L. Pereira, “Antivirus Applied to Google Chrome Extension Malware,” Computers & Security,
vol. 134, pp. 103–118, 2025.
6. B. Rosenzweig et al., “It’s Not Easy: Applying Supervised Machine Learning to Detect Malicious
Extensions,” arXiv preprint arXiv:2509.21590, 2025.
7. S. Singh et al., “A Study on Malicious Browser Extensions,” arXiv preprint arXiv:2503.04292,
2025.
8. M. Egele, T. Scholte, E. Kirda, and C. Kruegel, “A Survey on Automated Malware Analysis
Techniques,” ACM Computing Surveys, vol. 44, no. 2, pp. 1–42, 2012.
9. S. Agarwal et al., “Helping or Hindering? How Browser Extensions Undermine Web Security,”
in Proc. IEEE Symp. on Security and Privacy (S&P), 2022.
10. A. Barth, “The Web Origin Concept,” Internet Engineering Task Force (IETF), RFC 6454, 2011.
11. Google, “Chrome Extension Manifest V3 Documentation,” Google Developers, 2023.
12. Y. Liu et al., “Insecure by Design: Permission Abuse in Browser Extensions,” IEEE Access, vol.
9, pp. 112345–112359, 2021.
13. A. Guha, M. Fredrikson, and B. Livshits, “Static Analysis of Chrome Extensions,” in Proc. Int.
World Wide Web Conf. (WWW), 2015.