Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
P. 1
AccuvantBrowserSecCompar FINAL

AccuvantBrowserSecCompar FINAL

Ratings: (0)|Views: 27,748 |Likes:
Published by browsertest123

More info:

Published by: browsertest123 on Dec 09, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

02/26/2014

pdf

text

original

 
 
A Quantitative Approach
Browser Security Comparison
Document Profile
 Version 0.0Published 12/6/2011
 
 Browser Security Comparison
 –
A Quantitative Approach Page|
i
of 
v
Version 0.0 Revision Date: 12/6/2011
Revision History
Version Date Description
0.0
12/26/2011 Document published.
 
 Browser Security Comparison
 –
A Quantitative Approach Page|
ii
of 
v
Version 0.0 Revision Date: 12/6/2011
Contents
Authors .......................................................................................................................................................... vExecutive Summary ....................................................................................................................................... 1Methodology Delta ................................................................................................................................... 1Results ....................................................................................................................................................... 2Conclusion ................................................................................................................................................. 2Introduction .................................................................................................................................................. 3Analysis Targets ........................................................................................................................................ 4Analysis Environment................................................................................................................................ 4Analysis Goals ........................................................................................................................................... 4Browser Architecture .................................................................................................................................... 5Google Chrome ......................................................................................................................................... 5Internet Explorer ....................................................................................................................................... 5Mozilla Firefox ........................................................................................................................................... 6Summary ................................................................................................................................................... 6Browser Comparison ................................................................................................................................. 8Historical Vulnerability Statistics .................................................................................................................. 8Browser Comparison ................................................................................................................................. 8Issues with Counting Vulnerabilities ......................................................................................................... 9Issues Surrounding Timeline Data .......................................................................................................... 10Issues Surrounding Severity .................................................................................................................... 11Issues Unique to Particular Vendors ....................................................................................................... 11Data Gathering Methodology ................................................................................................................. 13Update Frequencies ................................................................................................................................ 13Publicly Known Vulnerabilities ................................................................................................................ 16Vulnerabilities by Severity ...................................................................................................................... 17Time to Patch .......................................................................................................................................... 18URL Blacklist Services .................................................................................................................................. 20Comparing Blacklists ............................................................................................................................... 20

Activity (11)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->