精品欧美一区二区三区在线观看 _久久久久国色av免费观看性色_国产精品久久在线观看_亚洲第一综合网站_91精品又粗又猛又爽_小泽玛利亚一区二区免费_91亚洲精品国偷拍自产在线观看 _久久精品视频在线播放_美女精品久久久_欧美日韩国产成人在线

How Instrumentation-based IAST and RASP Revolutionize Vulnerability Assessment for Applicati

原創 精選
Techplur
In this article, we invited Mr. Ning Ge, CTO of XMIRROR, to introduce the principles, technologies, and practical scenarios of ISATP and RASP in vulnerability assessment for application security.

Gartner has listed IAST and RASP as among its top ten security technologies for many years. These two instrumentation-based approaches, like vaccines for codes, have become increasingly popular tools to uncover and mitigate application vulnerabilities.

In this article, we invited Mr. Ning Ge, CTO of XMIRROR,  to introduce the principles, technologies, and practical scenarios of ISAT and RASP in vulnerability assessment for application security.


The "code vaccine": ISAT and RASP

In recent years, technological advancement has accelerated the evolution of the entire software industry. Software development has become increasingly complex due to the upgrade of development models, application architecture, servers, and infrastructure. Furthermore, problems and challenges relating to software security also arise.

The ISAT/RASP technology, or "code vaccine" as we refer it in this article, is a paradigm shift in security technology that enables self-discovery and self-immunization of software runtime risks with the technology of runtime instrumentation.

This technology consists of four main characteristics:

1. Security experts don't need to analyze source code line by line;

2. No need to modify and adjust the original code logic;

3. Maintaining complex traffic filtering policies and rules is no longer necessary;

4. The risk of the application being implemented by third-party components will be noticed.

A "code vaccine" is similar to the medical definition of a vaccine in that it emphasizes preventing security risks at the point of development rather than relying on traditional exogenous security measures. Utilize single-probe instrumentation, IAST and RASP are vital components of code vaccine technology.

IAST (Interactive Application Security Testing) has emerged as a technology for security testing in recent years. Compared to SAST white-box security testing and DAST black-box security testing, IAST has a higher vulnerability detection rate. This approach is more adaptable to new scenarios, and is more applicable to today's increasingly popular DevOps scenarios.

RASP(Runtime Application Self-Protection) is more tightly coupled to the application and detects the runtime environment of the application through runtime instrumentation, unlike traditional WAFs and IDSs. In this way, RASP can intercept and secure calls from the application to the system and security attacks can be detected and blocked in real time.

The "code vaccine" integrates the capabilities of IAST and RASP to find vulnerabilities and block attacks. Combined into one IAST & RASP probe, the code vaccine will provide a comprehensive full-lifecycle integrated detection and protection system.


The technology of IAST and RASP

Both IAST and RASP rely on runtime instrumentation to implement their algorithms. Runtime instrumentation occurs at the application layer after the application launch by replacing the function body or inserting detection code before and after the function. Using instrumentation code allows quick access to data about the application at critical points.

Due to the differences in the runtime environments among languages, the instrumentation method varies. Java, for example, requires that the bytecode of the key classes and methods of concern be modified during the process of class loading to insert & detect logic.

Generally, IAST features traffic learning and log analysis modes by replaying and analyzing traffic and logs to detect anomalies. Moreover, IAST is utterly transparent to R&D testers and other users, and it does not interfere with a process or require a specific language.

A more specific definition of IAST refers to the runtime instrumentation mode, which can help R&D testers quickly complete business security tests, pinpoint vulnerabilities, and make appropriate repairs. Furthermore, IAST can be classified into two modes: active IAST, which utilizes instrumentation to analyze traffic data, and passive IAST, which employs dynamic taint analysis.

Based on runtime instrumentation, Dynamic taint analysis can track the impact of external controllable data on an application, and then analyze the corresponding data flow within the application to determine if the application is vulnerable. The advantages of dynamic IASTs include preventing replays and dirty data, compatibility with cryptographic signature interaces, and adaptability to complex scenarios.

In dynamic taint analysis, the overall process of taint spreading can be divided into three stages: taint input, taint spreading, and taint pooling.

All external data is assumed to be untrustworthy in the taint input stage, so taint tags must be added to them when they enter the application.

In the taint spreading stage, the main goal is to track the spreading process of tainted data. Since the external data is tainted when it enters the application, the resulting new data will also carry the taint tag when the data undergoes operations or string splicing and others.

During the taint pooling stage, it is necessary to monitor functions that may lead to vulnerabilities and determine whether the tainted data will converge on sensitive functions such as SQL execution or file reading/writing. The occurrence of this process may indicate that there is a vulnerability in the execution process of these functions in the application.

In certain circumstances, the tainted data may encounter a clean function during spreading, and the taint tag carried by the data may be removed through filtering or other measures to ensure the security of a specific data link . This is how the dynamic taint analysis was carried out.

A key component of RASP is the injection of security logic and protection features into the application through instrumentation, penetration into the application runtime environment, and detection and protection against unforeseen security threats and attacks (e.g., 0-day attacks) through analysis and understanding of data flow and event flow.

RASP can use this model to solve WAF's shortcomings, including the inability to correlate detection rules and functions, weakness in server-side defense, and difficulty adapting microservices.

RASP can obtain runtime contextual data. Firstly, there is HTTP request and response data and various RPC protocols, including Dubbo request and response data and different RPC frameworks, such as gRPC.

Another type is the execution data of the function of interest, which includes the complete parameters received by the function, the instance of the object calling the function, and the function's return value executed during dynamic runtime. Obtaining the performance status of the runtime function allows us to determine whether the data of interest is available during the execution of the running function.

The third type of data is the call stack generated during the execution of the function. Obtaining the complete function call stack will enable you to facilitate the analysis of vulnerabilities , attacks, and the behaviors of attackers.

Several types of deserialization attacks can be analyzed through the function call stack.

The fourth type of data is the information on the application configuration. Information such as the security configurations of the application, the setting of in-code attributes, and other information can provide a complete picture of whether the application has implemented the security policy.

RASP can be analyzed and applied following on the data of the acquired runtime context. The protection logics based on the runtime context be categorized according to the algorithm or detection logic used:

One of the most conventional approaches is rule-based matching, where acquired parameters or HTTP requests are matched synthetically by rules.

The second method is lexical analysis, which is the greatest strength of RASP. With the more comprehensive data obtained by RASP, RASP can perform lexical analysis for complete input such as SQL, command execution, and other data to determine any anomalies at the key points of function execution.

The third category is behavior and operation stack detection, which is primarily used to detect sensitive functions being executed. For example, when WebShell is implanted in the system, it bypasses detection through deformation obfuscation. However, it calls the underlying runtime API while executing system commands or file operations. Thus, behavior and runtime stack analysis can determine which functions or function calling stacks were called.

The fourth is the application configuration detection, which detects the code's dynamic security configuration and other configurations. Some vulnerabilities cannot be exploited after adding specific security configurations. This includes the pre-compilation of code to prevent SQL injection and the XXE shutdown of external entity access. This provides a comprehensive overview of the current state of security.

The above four methods can be employed together to achieve the self-protection of the application at runtime.

In an overall protection system, RASP is coupled with each application while not conflicting with WAF, IDS/IPS, firewalls, etc. It is appropriate for modern application architectures and development and is compatible with both applications and microservices. Therefore, each security solution forms part of an in-depth defense strategy.


Practice Scenario of IAST and RASP

Four main scenarios can be applied to the practice of IAST and RASP. The first step is to integrate detection and protection into DevOps. Because probes are relatively lightweight, they can be released online along with the pipeline. In the development and testing process, IAST can be used for vulnerability detection, and RASP can be enabled for vulnerability protection following go-live, thereby integrating detection and protection of the whole process and improving the efficiency of the DevOps process.

The second scenario is the red-blue test. RASP plays the role of an advanced vulnerability protection tool in this scenario. To date, the red-blue test is usually applied to zero-days, one-days, or some undisclosed EXPs for attack and defense. Traditional traffic means have difficulty coping with this, while RASP can handle some advanced attacks.

The third aspect is contingency planning for unexpected vulnerabilities. RASP is capable of providing detection against threats based on behavior and call stack location, which would mitigate 0-day and 1-day attacks to some extent and provide time for remediation of vulnerabilities. RASP also offers hot patching, which can help protect against the first wave of vulnerability attacks by configuring some settings.

The fourth scenario pertains to the application's "self-immunity". With a containerized environment, probe and application can be packaged so that the application can provide its own attack protection after going live.

Performance and fusion issues are also of concern to the "code vaccine" that will provide fusing policies based on CPU, memory, or QPS/TPS. For instance, the "code vaccine" will set CPU, memory, and QPS/TPS thresholds. If those thresholds are exceeded, the probe will be fused and downgraded to ensure the business is prioritized and no business is adversely affected.

There is a set of closed-loop management of application risks for IAST and RASP. In the IAST, automated vulnerability validation is performed after a vulnerability is discovered, and data replay is performed by adding a payload to the parameter points (the amount of replay is small). A notification will be sent to the corresponding individual through the console if there is a vulnerability. At this point, the person in charge has the option of repairing the vulnerabilities or activating the hotfix function.

We could take the example of the remote code execution vulnerability of Log4j2 in 2021 to sort out the protection process. This vulnerability occurs in the system when an interface of the application or the implementation behind the interface applies a component of Log4j2, and turns on the modular JNDI's Log4j in-stack service output and log output.

An attacker who has discovered the vulnerability may send an HTTP request based on the vulnerable interface, and the JNDI-injected data is passed into the Log4j write logging operation. The vulnerability will be triggered upon executing the write log operation, and the attacker's server will be requested to load an external class file into the application, resulting in remote code execution.

RASP can intercept a number of steps in the process:

When a write log request is sent, a SSRF-like request will be sent internally, which is the first layer of protection.

Meanwhile, RASP can intercept a JNDI injection performed by an attacker and take appropriate measures against an attacker's execution of a command.

Once the vulnerability's cause has been identified, it can be identified using accurate instrumentation by the hotfix. Meanwhile, based on the instrumentation, we should clarify all the components and versions that the application depends upon, and analyze the component vulnerability by using SCA or OSS as well. In this way, "code vaccines" can provide better protection against 0-days(such as Log4j2), giving the security team more time to fix their bugs.


Guest Introduction

Ning Ge, the Chief Technology Officer of XMIRROR, has ten years of experience in the field of security research. He specializes in system and application software vulnerability detection, automated detection technologies, and DevSecOps system productization techniques. Among his responsibilities are designing and developing multiple product lines, including IAST, RASP, and SCA. Throughout her career, Ning has also contributed to a number of national research projects on security. He has been awarded numerous awards in the field of cybersecurity and has many original invention patents authorized. 

責任編輯:龐桂玉 來源: 51CTO
相關推薦

2015-01-06 10:41:51

2021-09-12 07:34:56

AST工具DongTai

2021-05-30 19:01:59

工具IAST網絡

2009-06-16 11:23:00

InstrumentaJava SE 6新特

2014-06-30 10:02:29

2022-07-26 11:08:14

ZadigIAST持續交付

2022-01-26 10:09:25

安全漏洞掃描工具緩存投毒漏洞

2021-09-16 10:57:20

云原生

2024-01-02 09:00:00

無服務器架構RASP

2014-11-13 09:39:50

2020-08-18 16:58:17

漏洞網絡安全網絡攻擊

2020-02-24 09:46:04

RSA大會網絡安全

2022-04-28 15:49:07

云安全網絡安全主動防御

2014-02-01 21:25:08

Python數組

2022-08-31 15:09:03

PythonOthers
點贊
收藏

51CTO技術棧公眾號

亚洲色图清纯唯美| 免费人成在线不卡| 日韩av一区二区在线观看| 免费看又黄又无码的网站| 亚洲av成人无码网天堂| 在线观看免费国产视频| 中国色在线日|韩| 欧美韩国日本综合| 91香蕉视频在线下载| 亚洲婷婷综合网| 欧美电影《轻佻寡妇》| 欧美不卡一区二区三区| 成人精品小视频| 国内外激情在线| 成年人网站91| 国产在线a不卡| 国产一级片毛片| www.黄色av| 2023国产精华国产精品| 色老汉一区二区三区| 在线观看亚洲视频啊啊啊啊| 日韩性xxxx| 久久激情五月激情| 欧美一区三区三区高中清蜜桃| 娇小11一12╳yⅹ╳毛片| 久久精品国产亚洲5555| 欧美欧美午夜aⅴ在线观看| www精品久久| 国产高清免费av在线| av电影在线观看一区| 成人欧美一区二区三区在线| 日本熟女毛茸茸| 亚洲一级二级| 久久香蕉国产线看观看av| 在线不卡av电影| 日韩最新在线| 精品处破学生在线二十三| 99re6在线观看| 国精产品一区一区三区四川| 岛国精品视频在线播放| 日韩伦理在线免费观看| 性欧美video高清bbw| 国产精品久久久久永久免费观看| 欧美日韩在线不卡一区| 午夜成人免费影院| 99久久精品免费| 国产91免费视频| 性生活黄色大片| 国产一区二区三区av电影| 国产欧美在线看| 亚洲天天综合网| 日韩av高清在线观看| 国产91在线播放| 在线观看日本网站| 亚洲欧美日本日韩| 欧美在线亚洲一区| 亚洲GV成人无码久久精品| 国产欧美一级| 4k岛国日韩精品**专区| 免费观看成人毛片| 久久精品主播| 国产精品18久久久久久首页狼| 久久久黄色大片| 老司机精品视频网站| 国产99视频精品免视看7| 欧美一区二区三区不卡视频| 日日夜夜免费精品| 国产精品久久久久久久久影视| 天堂网一区二区| 久久精品久久综合| 91在线观看免费观看| 99久久精品国产一区二区成人| 国产乱子伦视频一区二区三区 | 免费在线视频一区二区| 欧美日韩网址| 91chinesevideo永久地址| 日韩免费视频一区二区视频在线观看| 久热精品在线| 91精品美女在线| 亚洲av少妇一区二区在线观看| 岛国av在线一区| 麻豆成人在线播放| 自拍视频在线免费观看| 亚洲猫色日本管| 国产视频九色蝌蚪| 中文另类视频| 日韩午夜精品电影| 成人手机在线免费视频| 日本久久一二三四| 色综合久久精品亚洲国产| 免费观看一区二区三区毛片| 蜜桃精品视频在线| 懂色一区二区三区av片| 国产区在线视频| 一区二区三区日韩在线观看| 拔插拔插海外华人免费| 亚洲欧美在线成人| 精品国产一区二区在线观看| 色哟哟精品观看| 综合激情视频| 国产成人av网| 粉嫩小泬无遮挡久久久久久| 国产视频一区在线播放| 男人天堂a在线| 农村妇女一区二区| 日韩久久免费视频| 青娱乐免费在线视频| 日韩精品色哟哟| 99精品国产高清在线观看| 国产大片在线免费观看| 香蕉av福利精品导航| 久久6免费视频| 免费av一区| 久久久亚洲欧洲日产国码aⅴ| 中国一级特黄视频| 91小视频在线免费看| 精品视频在线观看一区二区| 成人深夜福利| 亚洲精品小视频| 久久精品国产亚洲av香蕉| 久久99精品一区二区三区三区| 精品国产一区二区三区麻豆小说 | 含羞草www国产在线视频| 色综合久久久久久久久久久| 在线观看成人动漫| 国产国产精品| www.久久色.com| 91精品国产高潮对白| 国产精品一区三区| 视频一区二区在线| 老色鬼在线视频| 日韩一区和二区| 精品人伦一区二区| 国产欧美一区二区色老头| 91精品在线看| yourporn在线观看视频| 丰满岳妇乱一区二区三区| 国产毛片久久久久久| 国产精品一在线观看| 97av在线播放| 人妻一区二区三区四区| 亚洲视频每日更新| 天天爱天天操天天干| 日韩中出av| 欧美精品亚州精品| www国产一区| 亚洲日本青草视频在线怡红院| 妞干网在线免费视频| 欧美日韩另类图片| 久久欧美在线电影| www.国产黄色| 亚洲一二三级电影| 亚洲911精品成人18网站| 我不卡手机影院| 国产一区香蕉久久| 麻豆传媒视频在线观看免费| 欧美日韩国产乱码电影| 美女av免费看| 久久国产精品99久久人人澡| 亚洲v国产v在线观看| 黄色成人在线视频| 在线看日韩欧美| 国产精品无码久久av| 中文字幕一区二区三区视频| 中文字幕国产免费| 999久久久91| 亚洲淫片在线视频| 国产黄大片在线观看画质优化| 欧美精品久久久久久久久老牛影院| 国产aaaaaaaaa| 捆绑调教一区二区三区| 一本一本a久久| 亚洲午夜剧场| 久久香蕉国产线看观看网| 97人妻精品一区二区三区视频| 成人免费在线视频观看| 免费不卡av网站| 狠狠爱www人成狠狠爱综合网 | 男女视频一区二区三区| 伊人春色精品| 国产精品久久久久久网站| 国产原创精品视频| 精品日韩一区二区| 伊人手机在线视频| 日本一区二区视频在线观看| 韩国一区二区在线播放| 欧美在线看片| 欧美极品一区二区| 日韩午夜电影免费看| 九九九久久久久久| 亚洲aaaaaaa| 色丁香久综合在线久综合在线观看| 国产亚洲精品精品精品| 国产成人精品www牛牛影视| 国产免费黄色av| 日韩电影一区| 国产精品三区四区| 亚洲欧洲美洲av| 欧美寡妇偷汉性猛交| 日韩大胆人体| 欧美精品少妇一区二区三区| 国产精品第72页| 日本一区二区三级电影在线观看| 亚洲麻豆一区二区三区| 日韩av在线发布| 国产1区2区3区中文字幕| 国产欧美日韩| 国产v亚洲v天堂无码| 91麻豆精品| 2019最新中文字幕| 久热国产在线| 亚洲人av在线影院| 精品人妻无码一区二区| 欧美色图片你懂的| 在线观看精品国产| 18欧美乱大交hd1984| 北岛玲一区二区| 狠狠色综合色综合网络| 久久综合久久色| 红桃视频国产精品| 亚洲一卡二卡三卡四卡无卡网站在线看 | 男人日女人视频网站| 99久久亚洲精品蜜臀| 免费成人av网站| 噜噜噜天天躁狠狠躁夜夜精品 | 亚洲人成无码网站久久99热国产| 91亚洲国产| 欧美专区一二三| 国产图片一区| 99久久一区三区四区免费| 韩国成人动漫| 青青草精品毛片| 少女频道在线观看高清| 日韩在线视频二区| 黄色在线播放| 日韩精品视频免费在线观看| 亚洲va欧美va| 欧美精品一级二级三级| 在线黄色av网站| 在线视频一区二区三区| 久久久久久久蜜桃| 国产精品国产自产拍高清av| 女人又爽又黄免费女仆| 99精品国产99久久久久久白柏| 毛茸茸free性熟hd| 国产99久久精品| 国产一级免费大片| 久久er99热精品一区二区| 久章草在线视频| 久久国产精品久久久久久电车 | 老鸭窝一区二区| 91网站黄www| 中文字幕一区二区三区乱码不卡| 韩国理伦片一区二区三区在线播放| 欧美一级裸体视频| 久久国产日本精品| 日日碰狠狠丁香久燥| 午夜在线播放视频欧美| 亚洲国产精品久久久久爰色欲| 亚洲精品欧洲| 无遮挡又爽又刺激的视频| 奶水喷射视频一区| 免费高清在线观看免费| 国产精品日本| 男女激情免费视频| 小嫩嫩精品导航| 少妇性l交大片| 日韩av中文在线观看| 亚洲一级片网站| 国产剧情在线观看一区二区| 熟女人妻一区二区三区免费看| 成人自拍视频在线| xxxxxx黄色| 久久综合九色综合久久久精品综合| 午夜在线观看一区| 国产精品视频一二| 国产精品白丝喷水在线观看| 一区二区在线观看av| 久久久久久激情| 色婷婷精品大视频在线蜜桃视频| 国产精品无码粉嫩小泬| 欧美区在线观看| 黄频在线免费观看| 在线观看国产成人av片| 国产黄大片在线观看画质优化| 久久久久久成人精品| 在线观看福利电影| 91精品啪aⅴ在线观看国产| aiai久久| 日本成人三级电影网站| 小小影院久久| 日韩不卡视频一区二区| 丝袜亚洲精品中文字幕一区| 成 人 黄 色 小说网站 s色| 国产丶欧美丶日本不卡视频| 丰满大乳奶做爰ⅹxx视频| 亚洲三级在线看| 亚洲男人第一av| 欧美在线短视频| 国产91免费在线观看| 亚洲性猛交xxxxwww| 国产高清一区二区三区视频| 97久久久免费福利网址| 成人免费视频观看| 久久久精品有限公司| 97精品中文字幕| 欧洲黄色一级视频| 加勒比av一区二区| 久久丫精品忘忧草西安产品| 国产精品无码永久免费888| 天堂а√在线中文在线鲁大师| 性久久久久久久久久久久| 国产熟女精品视频| 亚洲色图在线观看| 91九色国产在线播放| 国产精品一区二区电影| 亚洲影院天堂中文av色| 日韩人妻一区二区三区蜜桃视频| 久久aⅴ国产紧身牛仔裤| 肉丝美足丝袜一区二区三区四| 国产精品久久久久aaaa樱花| 国产无套内射又大又猛又粗又爽| 欧美色图天堂网| 无码精品一区二区三区在线| 在线观看不卡av| 成人欧美magnet| 狠狠色综合色区| 欧美日韩网站| 中文字幕人妻一区| 综合分类小说区另类春色亚洲小说欧美| 波多野结衣国产| 日韩欧美电影一二三| 在线三级中文| 成人av在线亚洲| 欧美中文一区二区| 日韩中文字幕免费在线| 久久午夜免费电影| 午夜影院在线看| 精品成人一区二区三区四区| av网在线观看| 国产精品午夜视频| 免费看av成人| 丰满爆乳一区二区三区| 麻豆国产精品视频| 视频国产一区二区| 欧美日韩午夜在线| 国产youjizz在线| 国产精品专区一| 欧美一二区在线观看| 红桃av在线播放| 91香蕉视频污| 中文字幕免费高清网站| 亚洲视频在线免费看| 欧美亚洲日本精品| 久久艹中文字幕| 久久久亚洲一区| 亚洲精品视频久久久| 欧美日韩亚洲精品内裤| 亚洲成熟女性毛茸茸| 欧美大片欧美激情性色a∨久久| 影音先锋欧美激情| 精品无码国产一区二区三区av| 99re66热这里只有精品3直播 | 污片在线观看一区二区| 亚洲精品无遮挡| 国产91对白在线播放| 国产99久久精品一区二区300| 久久精品网站视频| 日韩毛片视频在线看| 亚洲国产日韩在线观看| 国内伊人久久久久久网站视频 | 久久青草久久| a级片在线观看| 欧美性受极品xxxx喷水| 国产激情在线观看| 成人免费视频视频在| 亚洲欧洲日本mm| 久久精品老司机| 在线观看日韩一区| 成人黄视频在线观看| 国产精品swag| 青草国产精品久久久久久| 羞羞在线观看视频| 欧美va天堂va视频va在线| 午夜影院在线播放| 亚洲一区二区三区精品视频| 国产一区视频在线看| 日韩毛片在线播放| 在线观看精品国产视频| 精品国产一级| 精品人妻少妇一区二区| 久久久美女毛片| 国产精品一级视频| 久久免费高清视频| 日本一区福利在线| 五月激情五月婷婷| 亚洲成人一二三| 成年人视频网站在线| 精品国产免费久久久久久尖叫| 日韩黄色免费网站|