Web Browser Vulnerabilities and Weakness Descriptive Analysis: Is it Chrome Keep Dominant?

  • Authors

    • Abdullah Fajar
    • Setiadi Yazid
    • . .
    • . .
    2018-12-01
    https://doi.org/10.14419/ijet.v7i4.44.26999
  • Chrome, Vulnerability, Weakness, Attack, Security
  • Abstract

    Web Browser play the important mandatory role in accessing the application through the internet and may carry malicious content to the system hence  threatening the system from the attacker. Google Chrome is one of popular browser since released on 2008 as one of product of Chromium Project at Google. Chrome is fourth ranking in Common Vulnerabilities Enumeration website and the first ranking among browser that have most of vulnerabilities reported. This paper describe a Descriptive analysis of weakness and vulnerabilities of Chrome browser. The analysis use comparison approach to other popular browser such as Safari and Firefox. The analysis also use main reference and database from mitre.org which have common weakness enumeration database and scoring system calculation for vulnerability. This work cover responsiveness rate among them regarding weakness and vulnerabilities update duration and severity rate. The validation has performed using Descriptive test regarding weakness and vulnerability behavior. According to Architectural, Development and Research Conceptual weakness reported, the browsers has not significantly indicate the difference except between Chrome and Firefox in research conceptual weakness. The severity of browser vulnerabilities shown by Firefox and the best responsiveness to update browser weakness shown by Chrome, followed by Safari. Using Descriptive analysis, Chrome will keep dominant against the other browser, while Firefox and Safari potentially become unpopular such as Internet Explorer for upcoming time.

     

  • References

    1. [1] C. Reis, A. Barth, and C. Pizano, “Browser Security: Lessons from Google Chrome,†Queue, vol. 7, no. 5, p. 3, 2009.

      [2] T. Meskauskas, “What Are The Most Secure Web Browsers In 2018?,†PCRisk, 2018. [Online]. Available: https://www.pcrisk.com/computer-technician-blog/windows/12350-most-secure-browsers-2018.

      [3] P. Mell, K. Scarfone, and S. Romanosky, “A Complete Guide to the Common Vulnerability Scoring System Version 2.0,†FIRSTForum Incid. Response Secur. Teams, pp. 1–23, 2007.

      [4] -, “Common Weakness Enumeration,†http://cwe.mitre.org/, 2018. [Online]. Available: http://cwe.mitre.org/.

      [5] A. Barth, C. Jackson, and C. Reis, “The Security Architecture of the Chromium Browser,†Proc. WWW 2009, 2008.

      [6] D. Smith, “The Yontoo Trojan: New Mac OS X Malware Infects Google Chrome, Firefox And Safari Browsers Via Adware,†International Business Time, 2013.

      [7] D. Goodin, “MySQL.com breach leaves visitors exposed to malware,†The Register, 2011.

      [8] -, “On Browser Security Updates, OS and Internet Use,†HoopsOnline, 2016.

      [9] D. Szabo, FRAUD SMARTS - Fraud Prevention Handbook, 2017 Editi. eFraud Prevention, LLC, 2012.

      [10] -, “Google Chrome Vulnerability Statistics,†CVE Details, 2018. [Online]. Available: https://www.cvedetails.com/product/15031/Google-Chrome.html?vendor_id=1224.

      [11] P. S. Satish, “Web Browser Security : Different Attacks Detection and Prevention Techniques,†vol. 170, no. 9, pp. 35–41, 2017.

      [12] HAL9000, “7 Chromium Based Browsers With Extra Features,†Raymond.cc, 2017. [Online]. Available: https://www.raymond.cc/blog/chromium-browser-alternatives-with-extra-features/. [Accessed: 14-Apr-2018].

      [13] S. Anthony, “Opera admits defeat, switches to Google’s Chromium,†Extrme Tech, 2013. [Online]. Available: https://www.extremetech.com/computing/148312-opera-drops-presto-switch-to-google-and-apples-webkit-rendering-engine. [Accessed: 15-Jul-2018].

  • Downloads

  • How to Cite

    Fajar, A., Yazid, S., ., ., & ., . (2018). Web Browser Vulnerabilities and Weakness Descriptive Analysis: Is it Chrome Keep Dominant?. International Journal of Engineering & Technology, 7(4.44), 242-246. https://doi.org/10.14419/ijet.v7i4.44.26999

    Received date: 2019-02-02

    Accepted date: 2019-02-02

    Published date: 2018-12-01