Research on Exploiting Browser Use-After-Free Bugs Triggered by User Interaction 


Vol. 14,  No. 8, pp. 569-575, Aug.  2025
https://doi.org/10.3745/TKIPS.2025.14.8.569


PDF
  Abstract

This study demonstrates that browser UI (User Interface) bugs triggered by user interactions can pose a security threat and introduces a method to exploit them to attack the main browser process. Web browsers are essential software used by hundreds of millions, and vulnerabilities in them can lead to large-scale security incidents if exploited. While UI bugs have traditionally been regarded as minor usability issues with lower patch priority, this study designs an attack scenario that leverages memory corruption vulnerabilities, such as Use-After-Free (UAF), caused by UI bugs to manipulate browser execution flow and conducts experiments using actual vulnerabilities. Through this, the study aims to raise awareness of the security risks posed by UI bugs in browsers and highlight the necessity of addressing such vulnerabilities

  Statistics


  Cite this article

[IEEE Style]

Y. Lee and B. Lee, "Research on Exploiting Browser Use-After-Free Bugs Triggered by User Interaction," The Transactions of the Korea Information Processing Society, vol. 14, no. 8, pp. 569-575, 2025. DOI: https://doi.org/10.3745/TKIPS.2025.14.8.569.

[ACM Style]

Youngjoo Lee and Byoungyoung Lee. 2025. Research on Exploiting Browser Use-After-Free Bugs Triggered by User Interaction. The Transactions of the Korea Information Processing Society, 14, 8, (2025), 569-575. DOI: https://doi.org/10.3745/TKIPS.2025.14.8.569.