Web Browser Vulnerabilities and Weakness Descriptive Analysis: Is it Chrome Keep Dominant?
Keywords:Chrome, Vulnerability, Weakness, Attack, Security
Web Browser play the important mandatory role in accessing the application through the internet and may carry malicious content to the system hence threatening the system from the attacker. Google Chrome is one of popular browser since released on 2008 as one of product of Chromium Project at Google. Chrome is fourth ranking in Common Vulnerabilities Enumeration website and the first ranking among browser that have most of vulnerabilities reported. This paper describe a Descriptive analysis of weakness and vulnerabilities of Chrome browser. The analysis use comparison approach to other popular browser such as Safari and Firefox. The analysis also use main reference and database from mitre.org which have common weakness enumeration database and scoring system calculation for vulnerability. This work cover responsiveness rate among them regarding weakness and vulnerabilities update duration and severity rate. The validation has performed using Descriptive test regarding weakness and vulnerability behavior. According to Architectural, Development and Research Conceptual weakness reported, the browsers has not significantly indicate the difference except between Chrome and Firefox in research conceptual weakness. The severity of browser vulnerabilities shown by Firefox and the best responsiveness to update browser weakness shown by Chrome, followed by Safari. Using Descriptive analysis, Chrome will keep dominant against the other browser, while Firefox and Safari potentially become unpopular such as Internet Explorer for upcoming time.
 C. Reis, A. Barth, and C. Pizano, â€œBrowser Security: Lessons from Google Chrome,â€ Queue, vol. 7, no. 5, p. 3, 2009.
 T. Meskauskas, â€œWhat Are The Most Secure Web Browsers In 2018?,â€ PCRisk, 2018. [Online]. Available: https://www.pcrisk.com/computer-technician-blog/windows/12350-most-secure-browsers-2018.
 P. Mell, K. Scarfone, and S. Romanosky, â€œA Complete Guide to the Common Vulnerability Scoring System Version 2.0,â€ FIRSTForum Incid. Response Secur. Teams, pp. 1â€“23, 2007.
 A. Barth, C. Jackson, and C. Reis, â€œThe Security Architecture of the Chromium Browser,â€ Proc. WWW 2009, 2008.
 D. Smith, â€œThe Yontoo Trojan: New Mac OS X Malware Infects Google Chrome, Firefox And Safari Browsers Via Adware,â€ International Business Time, 2013.
 D. Goodin, â€œMySQL.com breach leaves visitors exposed to malware,â€ The Register, 2011.
 -, â€œOn Browser Security Updates, OS and Internet Use,â€ HoopsOnline, 2016.
 D. Szabo, FRAUD SMARTS - Fraud Prevention Handbook, 2017 Editi. eFraud Prevention, LLC, 2012.
 -, â€œGoogle Chrome Vulnerability Statistics,â€ CVE Details, 2018. [Online]. Available: https://www.cvedetails.com/product/15031/Google-Chrome.html?vendor_id=1224.
 P. S. Satish, â€œWeb Browser Security : Different Attacks Detection and Prevention Techniques,â€ vol. 170, no. 9, pp. 35â€“41, 2017.
 HAL9000, â€œ7 Chromium Based Browsers With Extra Features,â€ Raymond.cc, 2017. [Online]. Available: https://www.raymond.cc/blog/chromium-browser-alternatives-with-extra-features/. [Accessed: 14-Apr-2018].
 S. Anthony, â€œOpera admits defeat, switches to Googleâ€™s Chromium,â€ Extrme Tech, 2013. [Online]. Available: https://www.extremetech.com/computing/148312-opera-drops-presto-switch-to-google-and-apples-webkit-rendering-engine. [Accessed: 15-Jul-2018].
View Full Article:
How to Cite
LicenseAuthors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under aÂ Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (SeeÂ The Effect of Open Access).