Trends and Lessons from Three Years Fighting Malicious Extensions

   Abstract