Copyright © 2018 Authors. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted
use, distribution, and reproduction in any medium, provided the original work is properly cited.
International Journal of Engineering & Technology, 7 (4.44) (2018) 242-246
International Journal of Engineering & Technology
Website: www.sciencepubco.com/index.php/IJET
Research paper
Web Browser Vulnerabilities and Weakness Descriptive Analysis: Is
it Chrome Keep Dominant?
Abdullah Fajar
1*
, Setiadi Yazid
2*
1,2
Faculty of Computer Science,Universitas Indonesia
1
Faculty Of Engineering, Universitas Widyatama
*Corresponding author E-mail: setiadi@cs.ui.ac.id;
Abstract
Web Browser play the important mandatory role in accessing the application through the internet and may carry malicious content to the
system hence threatening the system from the attacker. Google Chrome is one of popular browser since released on 2008 as one of prod-
uct of Chromium Project at Google. Chrome is fourth ranking in Common Vulnerabilities Enumeration website and the first ranking
among browser that have most of vulnerabilities reported. This paper describe a Descriptive analysis of weakness and vulnerabilities of
Chrome browser. The analysis use comparison approach to other popular browser such as Safari and Firefox. The analysis also use main
reference and database from mitre.org which have common weakness enumeration database and scoring system calculation for vulnera-
bility. This work cover responsiveness rate among them regarding weakness and vulnerabilities update duration and severity rate. The
validation has performed using Descriptive test regarding weakness and vulnerability behavior. According to Architectural, Development
and Research Conceptual weakness reported, the browsers has not significantly indicate the difference except between Chrome and Fire-
fox in research conceptual weakness. The severity of browser vulnerabilities shown by Firefox and the best responsiveness to update
browser weakness shown by Chrome, followed by Safari. Using Descriptive analysis, Chrome will keep dominant against the other
browser, while Firefox and Safari potentially become unpopular such as Internet Explorer for upcoming time.
Keywords: Chrome; Vulnerability; Weakness; Attack; Security
1. Introduction
The most interaction between internet and computer user through
World Wide Web. Users can browse the content of internet with a
diverse landscape of services and applications. Now, the services
and application through the web must keep their user safe from
various malicious content. The main target in this challenge most-
ly occurred on web browsers. Insecure/malicious content sender
(attacker) point at Web Browsers because there is a lot of com-
promising to keep the risk content able to be delivered through it.
Reis et.al [1] stated, there three factor must be considered by
browsers vendor to keep safe, there are: (1) The Severity of Vul-
nerability; (2) The windows of Vulnerability; (3) The Frequency
of exposure. If these consideration are followed out by mitigation
action then the security will improve, multiply benefit and assist
user to keep users safe.
Securing browser is the first step that need to be taken in order
to assure secure online protection. The threats tend to increase by
taking advantage of web browser vulnerability through vulnerable
webs application. This condition become worse according to sev-
eral factor such as:
1. Many computer users are not aware of the click on the
web links.
2. Software and third party software packages installed
combined increases the number of vulnerabilities
3. Many websites require that users enable features or in-
stall more software, third- party software which doesn’t
get security updates putting the computer at additional
risk.
4. Many users do not know how to configure their web
browsers securely
If that website design allowing to host malicious code, then
some vulnerabilities in a particular browser enabling this mali-
cious code to run processes within the browser application in unin-
tended ways. Web Browser vulnerability can be minimized by
means of updating process regularly [2]. That prevention will not
affective if the underlying system has already compromised. Some
parts of browsers such as scripting, add-ons, and cookies are par-
ticularly vulnerable and need to be considered for taking action
further.
Google Chrome as one of popular web browser is released at late
2008. This browser is intended to be fast and secure one. Chrome
treat each web page as individual process and make it as a sand-
boxing to confirm the safety. Chrome uses a model to allocate a
process for sandboxing tabs. Chrome retrieves updates regularly
of two issues (phishing and malware), and also Google warns
users if they attempt to visit a potentially harmful which has al-
ready warning flag. This service is also made available for use by
others via a free public API called "Google Safe Browsing API".
This paper describe an analysis of weakness and vulnerabilities
enumeration for Chrome Browser as case study. This work use
Descriptive data analysis approach from CVE database (cve-
details.com) to describe vulnerability and weakness occurrences
behavior. This work choose Chrome as target to be analyzed and
will compare the characteristics to other browser such as Safari,