Inside the Browser Matrix: Mapping the Unseen Threat Surface
Neal Humphrey,
Seraphic Security
The browser is no longer just a delivery mechanism; it's an active execution surface. Yet, ATT&CK lacks a dedicated platform to represent browser-native techniques, such as extension abuse, cross-context messaging hijack, session token exfiltration, and DOM-based persistence. In this session, we walk through the process of discovering, simulating, and mapping these browser-specific TTPs using BrowserTotal, an open threat emulation and telemetry platform designed to expose browser-layer threats. We’ll share real-world observations, ATT&CK mappings, and gaps, and propose an expansion of the ATT&CK Matrix to formally introduce “Browser” as a platform. The session concludes with a bold proposal: launching a new MITRE Evaluation Track for Browser Security, which will cover simulation design, evaluation criteria, and open telemetry contributions. Key takeaways for attendees: A new lens to view browsers as threat surfaces, Real ATT&CK-aligned browser TTPs observed and simulated, Blueprint for contributing techniques to the ATT&CK matrix, Call to action to join a proposed MITRE Evaluation for browser platforms