Nytro Posted December 10, 2011 Report Posted December 10, 2011 Browser Security ComparisonA Quantitative ApproachDocument ProfileVersion 0.0Published 12/6/2011ContentsAuthors ......................................................................................................................................................... vExecutive Summary ...................................................................................................................................... 1Methodology Delta .................................................................................................................................. 1Results ...................................................................................................................................................... 2Conclusion ................................................................................................................................................ 2Introduction ................................................................................................................................................. 3Analysis Targets ....................................................................................................................................... 4Analysis Environment............................................................................................................................... 4Analysis Goals .......................................................................................................................................... 4Browser Architecture ................................................................................................................................... 5Google Chrome ........................................................................................................................................ 5Internet Explorer ...................................................................................................................................... 5Mozilla Firefox .......................................................................................................................................... 6Summary .................................................................................................................................................. 6Browser Comparison ................................................................................................................................ 8Historical Vulnerability Statistics .................................................................................................................. 8Browser Comparison ................................................................................................................................ 8Issues with Counting Vulnerabilities ......................................................................................................... 9Issues Surrounding Timeline Data .......................................................................................................... 10Issues Surrounding Severity .................................................................................................................... 11Issues Unique to Particular Vendors ....................................................................................................... 11Data Gathering Methodology ................................................................................................................. 13Update Frequencies ............................................................................................................................... 13Publicly Known Vulnerabilities ................................................................................................................ 16Vulnerabilities by Severity ...................................................................................................................... 17Time to Patch ......................................................................................................................................... 18URL Blacklist Services ................................................................................................................................. 20Comparing Blacklists ............................................................................................................................... 20“Antivirus-via-HTTP” ............................................................................................................................... 20Multi-Browser Defense ........................................................................................................................... 20Comparing Blacklist Services ................................................................................................................... 21Comparison Methodology ...................................................................................................................... 21Results Analysis ...................................................................................................................................... 21Conclusions ............................................................................................................................................ 25Anti-exploitation Technologies ................................................................................................................... 26Address Space Layout Randomization (ASLR) ......................................................................................... 26Data Execution Prevention (DEP) ............................................................................................................ 26Stack Cookies (/GS) ................................................................................................................................ 26SafeSEH/SEHOP ...................................................................................................................................... 26Sandboxing ............................................................................................................................................. 27JIT Hardening ......................................................................................................................................... 28Browser Anti-Exploitation Analysis ............................................................................................................. 31Browser Comparison ............................................................................................................................... 32Google Chrome ...................................................................................................................................... 34Microsoft Internet Explorer .................................................................................................................... 45Mozilla Firefox ........................................................................................................................................ 58Browser Add-Ons ....................................................................................................................................... 67Browser Comparison ............................................................................................................................... 68Google Chrome ...................................................................................................................................... 69Internet Explorer .................................................................................................................................... 80Firefox .................................................................................................................................................... 89Add-on summary ................................................................................................................................... 97Conclusions ................................................................................................................................................ 98Bibliography ............................................................................................................................................. 100Appendix A – Chrome Frame ......................................................................................................................... IOverview ................................................................................................................................................... IDecomposition ......................................................................................................................................... IISecurity Implications ............................................................................................................................... IIIRisk Mitigation Strategies ......................................................................................................................... VConclusion ................................................................................................................................................ VBibliography ............................................................................................................................................ VIAppendix B .................................................................................................................................................... IGoogle Chrome ......................................................................................................................................... IInternet Explorer ................................................................................................................................... XIIIMozilla Firefox ..................................................................................................................................... XVIIITools .............................................................................................................................................................. IAuthorsListed in alphabetical order:- Joshua Drake (jdrake@accuvant.com)- Paul Mehta (pmehta@accuvant.com)- Charlie Miller (charlie.miller@accuvant.com)- Shawn Moyer (smoyer@accuvant.com)- Ryan Smith (rsmith@accuvant.com)- Chris Valasek (cvalasek@accuvant.com)Pages: 140Download:http://www.accuvant.com/sites/default/files/AccuvantBrowserSecCompar_FINAL.pdf Quote