Visible to the public Evil-Twin Browsers: Using Open-Source Code to Clone Browsers for Malicious Purposes

TitleEvil-Twin Browsers: Using Open-Source Code to Clone Browsers for Malicious Purposes
Publication TypeConference Paper
Year of Publication2022
AuthorsSalcedo, Mathew David, Abid, Mehdi, Kim, Yoohwan, Jo, Ju-Yeon
Conference Name2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)
Keywordsbrowser, browser security, Browsers, Chromium, Cloning, codes, compositionality, Conferences, cyberattack, evil-twin, extension, Human Behavior, Metrics, open-source, Prototypes, pubcrawl, resilience, Resiliency, security, trojan
AbstractBrowsers are one of the most widely used types of software around the world. This prevalence makes browsers a prime target for cyberattacks. To mitigate these threats, users can practice safe browsing habits and take advantage of the security features available to browsers. These protections, however, could be severely crippled if the browser itself were malicious. Presented in this paper is the concept of the evil-twin browser (ETB), a clone of a legitimate browser that looks and behaves identically to the original browser, but discreetly performs other tasks that harm a user's security. To better understand the concept of the evil-twin browser, a prototype ETB named ChroNe was developed. The creation and installation process of ChroN e is discussed in this paper. This paper also explores the motivation behind creating such a browser, examines existing relevant work, inspects the open-source codebase Chromium that assisted in ChroNe's development, and discusses relevant topics like ways to deliver an ETB, the capabilities of an ETB, and possible ways to defend against ETBs.
DOI10.1109/CCWC54503.2022.9720866
Citation Keysalcedo_evil-twin_2022