Google details Chrome browser security-testing technology
- 27 April, 2012 05:34
Since late last year, Google has been using an industrial-strength testing system to identify, analyze and fix security holes in its Chrome browser, helping it significantly cut down on the number of vulnerabilities that slip through to the most recent version product in production.
Google calls the system ClusterFuzz. It's made up of "several hundred" virtual machines loaded with about 6,000 Chrome instances, subjecting them to about 50 million test cases every day, the company said on Thursday.
The system's capacity is projected to quadruple in the coming weeks. Since its full deployment late last year, ClusterFuzz has flagged 95 unique vulnerabilities, 44 of which were fixed before making it into the most recent stable release of the browser, according to a Google blog post.
In addition to benefiting users of the product, the detections also help open-source software used by Chrome like WebKit and FFmpeg, because Google submits vulnerability reports to their project teams.
In addition to running the tests and detecting browser crashes, ClusterFuzz is also used to manage the distribution of test cases, analyze the crashes to determine if they involve a security hole that can be exploited, and verify if a vulnerability has been properly fixed.
Juan Carlos Perez covers enterprise communication/collaboration suites, operating systems, browsers and general technology breaking news for The IDG News Service. Follow Juan on Twitter at @JuanCPerezIDG.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Five trends affecting legal CIOs
CIO Roundtable: The changing face of security
Bitcoin malware count soars as cryptocurrency value climbs
Bouncing Back From CIO Unemployment
Union slams latest fibre-to-premise trial in Tasmania
Best Practices in Data Protection Monitoring
This whitepaper discusses best practice in data protection monitoring, with a focus on recoverability and visibility as significant drivers for success. Whether backing up a private cloud or several smaller environments, learn how a unified view is necessary for proactively reporting protection, compliance to auditors, and understanding overall data protection health, performance, and reliability.
Managing your User Environment
Business users are accessing more data, across more devices than ever before. For IT departments, this means an increasing number of problems. This whitepaper details a number of strategies to help prevent challenges in cost, efficiency and security, now and into the future.
Security in a Faster Forward World
Organizations today operate in a Faster Forward world, as they experience a shift towards an increasingly mobile workforce. Following this, an evolving stream of attackers are now targeting mobile devices where they can more easily access a larger number of high-value corporate and government assets. This paper will guide you through finding the right Web security partner that can improve efficiency while reducing risks and improving web experience.