精品欧美一区二区三区在线观看 _久久久久国色av免费观看性色_国产精品久久在线观看_亚洲第一综合网站_91精品又粗又猛又爽_小泽玛利亚一区二区免费_91亚洲精品国偷拍自产在线观看 _久久精品视频在线播放_美女精品久久久_欧美日韩国产成人在线

How Instrumentation-based IAST and RASP Revolutionize Vulnerability Assessment for Applicati

原創 精選
Techplur
In this article, we invited Mr. Ning Ge, CTO of XMIRROR, to introduce the principles, technologies, and practical scenarios of ISATP and RASP in vulnerability assessment for application security.

Gartner has listed IAST and RASP as among its top ten security technologies for many years. These two instrumentation-based approaches, like vaccines for codes, have become increasingly popular tools to uncover and mitigate application vulnerabilities.

In this article, we invited Mr. Ning Ge, CTO of XMIRROR,  to introduce the principles, technologies, and practical scenarios of ISAT and RASP in vulnerability assessment for application security.


The "code vaccine": ISAT and RASP

In recent years, technological advancement has accelerated the evolution of the entire software industry. Software development has become increasingly complex due to the upgrade of development models, application architecture, servers, and infrastructure. Furthermore, problems and challenges relating to software security also arise.

The ISAT/RASP technology, or "code vaccine" as we refer it in this article, is a paradigm shift in security technology that enables self-discovery and self-immunization of software runtime risks with the technology of runtime instrumentation.

This technology consists of four main characteristics:

1. Security experts don't need to analyze source code line by line;

2. No need to modify and adjust the original code logic;

3. Maintaining complex traffic filtering policies and rules is no longer necessary;

4. The risk of the application being implemented by third-party components will be noticed.

A "code vaccine" is similar to the medical definition of a vaccine in that it emphasizes preventing security risks at the point of development rather than relying on traditional exogenous security measures. Utilize single-probe instrumentation, IAST and RASP are vital components of code vaccine technology.

IAST (Interactive Application Security Testing) has emerged as a technology for security testing in recent years. Compared to SAST white-box security testing and DAST black-box security testing, IAST has a higher vulnerability detection rate. This approach is more adaptable to new scenarios, and is more applicable to today's increasingly popular DevOps scenarios.

RASP(Runtime Application Self-Protection) is more tightly coupled to the application and detects the runtime environment of the application through runtime instrumentation, unlike traditional WAFs and IDSs. In this way, RASP can intercept and secure calls from the application to the system and security attacks can be detected and blocked in real time.

The "code vaccine" integrates the capabilities of IAST and RASP to find vulnerabilities and block attacks. Combined into one IAST & RASP probe, the code vaccine will provide a comprehensive full-lifecycle integrated detection and protection system.


The technology of IAST and RASP

Both IAST and RASP rely on runtime instrumentation to implement their algorithms. Runtime instrumentation occurs at the application layer after the application launch by replacing the function body or inserting detection code before and after the function. Using instrumentation code allows quick access to data about the application at critical points.

Due to the differences in the runtime environments among languages, the instrumentation method varies. Java, for example, requires that the bytecode of the key classes and methods of concern be modified during the process of class loading to insert & detect logic.

Generally, IAST features traffic learning and log analysis modes by replaying and analyzing traffic and logs to detect anomalies. Moreover, IAST is utterly transparent to R&D testers and other users, and it does not interfere with a process or require a specific language.

A more specific definition of IAST refers to the runtime instrumentation mode, which can help R&D testers quickly complete business security tests, pinpoint vulnerabilities, and make appropriate repairs. Furthermore, IAST can be classified into two modes: active IAST, which utilizes instrumentation to analyze traffic data, and passive IAST, which employs dynamic taint analysis.

Based on runtime instrumentation, Dynamic taint analysis can track the impact of external controllable data on an application, and then analyze the corresponding data flow within the application to determine if the application is vulnerable. The advantages of dynamic IASTs include preventing replays and dirty data, compatibility with cryptographic signature interaces, and adaptability to complex scenarios.

In dynamic taint analysis, the overall process of taint spreading can be divided into three stages: taint input, taint spreading, and taint pooling.

All external data is assumed to be untrustworthy in the taint input stage, so taint tags must be added to them when they enter the application.

In the taint spreading stage, the main goal is to track the spreading process of tainted data. Since the external data is tainted when it enters the application, the resulting new data will also carry the taint tag when the data undergoes operations or string splicing and others.

During the taint pooling stage, it is necessary to monitor functions that may lead to vulnerabilities and determine whether the tainted data will converge on sensitive functions such as SQL execution or file reading/writing. The occurrence of this process may indicate that there is a vulnerability in the execution process of these functions in the application.

In certain circumstances, the tainted data may encounter a clean function during spreading, and the taint tag carried by the data may be removed through filtering or other measures to ensure the security of a specific data link . This is how the dynamic taint analysis was carried out.

A key component of RASP is the injection of security logic and protection features into the application through instrumentation, penetration into the application runtime environment, and detection and protection against unforeseen security threats and attacks (e.g., 0-day attacks) through analysis and understanding of data flow and event flow.

RASP can use this model to solve WAF's shortcomings, including the inability to correlate detection rules and functions, weakness in server-side defense, and difficulty adapting microservices.

RASP can obtain runtime contextual data. Firstly, there is HTTP request and response data and various RPC protocols, including Dubbo request and response data and different RPC frameworks, such as gRPC.

Another type is the execution data of the function of interest, which includes the complete parameters received by the function, the instance of the object calling the function, and the function's return value executed during dynamic runtime. Obtaining the performance status of the runtime function allows us to determine whether the data of interest is available during the execution of the running function.

The third type of data is the call stack generated during the execution of the function. Obtaining the complete function call stack will enable you to facilitate the analysis of vulnerabilities , attacks, and the behaviors of attackers.

Several types of deserialization attacks can be analyzed through the function call stack.

The fourth type of data is the information on the application configuration. Information such as the security configurations of the application, the setting of in-code attributes, and other information can provide a complete picture of whether the application has implemented the security policy.

RASP can be analyzed and applied following on the data of the acquired runtime context. The protection logics based on the runtime context be categorized according to the algorithm or detection logic used:

One of the most conventional approaches is rule-based matching, where acquired parameters or HTTP requests are matched synthetically by rules.

The second method is lexical analysis, which is the greatest strength of RASP. With the more comprehensive data obtained by RASP, RASP can perform lexical analysis for complete input such as SQL, command execution, and other data to determine any anomalies at the key points of function execution.

The third category is behavior and operation stack detection, which is primarily used to detect sensitive functions being executed. For example, when WebShell is implanted in the system, it bypasses detection through deformation obfuscation. However, it calls the underlying runtime API while executing system commands or file operations. Thus, behavior and runtime stack analysis can determine which functions or function calling stacks were called.

The fourth is the application configuration detection, which detects the code's dynamic security configuration and other configurations. Some vulnerabilities cannot be exploited after adding specific security configurations. This includes the pre-compilation of code to prevent SQL injection and the XXE shutdown of external entity access. This provides a comprehensive overview of the current state of security.

The above four methods can be employed together to achieve the self-protection of the application at runtime.

In an overall protection system, RASP is coupled with each application while not conflicting with WAF, IDS/IPS, firewalls, etc. It is appropriate for modern application architectures and development and is compatible with both applications and microservices. Therefore, each security solution forms part of an in-depth defense strategy.


Practice Scenario of IAST and RASP

Four main scenarios can be applied to the practice of IAST and RASP. The first step is to integrate detection and protection into DevOps. Because probes are relatively lightweight, they can be released online along with the pipeline. In the development and testing process, IAST can be used for vulnerability detection, and RASP can be enabled for vulnerability protection following go-live, thereby integrating detection and protection of the whole process and improving the efficiency of the DevOps process.

The second scenario is the red-blue test. RASP plays the role of an advanced vulnerability protection tool in this scenario. To date, the red-blue test is usually applied to zero-days, one-days, or some undisclosed EXPs for attack and defense. Traditional traffic means have difficulty coping with this, while RASP can handle some advanced attacks.

The third aspect is contingency planning for unexpected vulnerabilities. RASP is capable of providing detection against threats based on behavior and call stack location, which would mitigate 0-day and 1-day attacks to some extent and provide time for remediation of vulnerabilities. RASP also offers hot patching, which can help protect against the first wave of vulnerability attacks by configuring some settings.

The fourth scenario pertains to the application's "self-immunity". With a containerized environment, probe and application can be packaged so that the application can provide its own attack protection after going live.

Performance and fusion issues are also of concern to the "code vaccine" that will provide fusing policies based on CPU, memory, or QPS/TPS. For instance, the "code vaccine" will set CPU, memory, and QPS/TPS thresholds. If those thresholds are exceeded, the probe will be fused and downgraded to ensure the business is prioritized and no business is adversely affected.

There is a set of closed-loop management of application risks for IAST and RASP. In the IAST, automated vulnerability validation is performed after a vulnerability is discovered, and data replay is performed by adding a payload to the parameter points (the amount of replay is small). A notification will be sent to the corresponding individual through the console if there is a vulnerability. At this point, the person in charge has the option of repairing the vulnerabilities or activating the hotfix function.

We could take the example of the remote code execution vulnerability of Log4j2 in 2021 to sort out the protection process. This vulnerability occurs in the system when an interface of the application or the implementation behind the interface applies a component of Log4j2, and turns on the modular JNDI's Log4j in-stack service output and log output.

An attacker who has discovered the vulnerability may send an HTTP request based on the vulnerable interface, and the JNDI-injected data is passed into the Log4j write logging operation. The vulnerability will be triggered upon executing the write log operation, and the attacker's server will be requested to load an external class file into the application, resulting in remote code execution.

RASP can intercept a number of steps in the process:

When a write log request is sent, a SSRF-like request will be sent internally, which is the first layer of protection.

Meanwhile, RASP can intercept a JNDI injection performed by an attacker and take appropriate measures against an attacker's execution of a command.

Once the vulnerability's cause has been identified, it can be identified using accurate instrumentation by the hotfix. Meanwhile, based on the instrumentation, we should clarify all the components and versions that the application depends upon, and analyze the component vulnerability by using SCA or OSS as well. In this way, "code vaccines" can provide better protection against 0-days(such as Log4j2), giving the security team more time to fix their bugs.


Guest Introduction

Ning Ge, the Chief Technology Officer of XMIRROR, has ten years of experience in the field of security research. He specializes in system and application software vulnerability detection, automated detection technologies, and DevSecOps system productization techniques. Among his responsibilities are designing and developing multiple product lines, including IAST, RASP, and SCA. Throughout her career, Ning has also contributed to a number of national research projects on security. He has been awarded numerous awards in the field of cybersecurity and has many original invention patents authorized. 

責任編輯:龐桂玉 來源: 51CTO
相關推薦

2015-01-06 10:41:51

2021-09-12 07:34:56

AST工具DongTai

2021-05-30 19:01:59

工具IAST網絡

2009-06-16 11:23:00

InstrumentaJava SE 6新特

2014-06-30 10:02:29

2022-07-26 11:08:14

ZadigIAST持續交付

2022-01-26 10:09:25

安全漏洞掃描工具緩存投毒漏洞

2021-09-16 10:57:20

云原生

2024-01-02 09:00:00

無服務器架構RASP

2014-11-13 09:39:50

2020-08-18 16:58:17

漏洞網絡安全網絡攻擊

2020-02-24 09:46:04

RSA大會網絡安全

2022-04-28 15:49:07

云安全網絡安全主動防御

2014-02-01 21:25:08

Python數組

2022-08-31 15:09:03

PythonOthers
點贊
收藏

51CTO技術棧公眾號

欧美一区二区三区男人的天堂| 久久天天做天天爱综合色| 色偷偷88888欧美精品久久久| 国产一伦一伦一伦| xvideos国产在线视频| 国产1区2区3区精品美女| 日本老师69xxx| 小早川怜子一区二区的演员表| 91麻豆精品国产91久久久久推荐资源| 精品久久久精品| 亚洲成色www久久网站| www.久久成人| 肉色丝袜一区二区| 欧美日产国产成人免费图片| 久久久久久九九九九九| 国产一区二区高清在线| 日韩欧美精品在线观看| 男女爱爱视频网站| 国产资源在线播放| 国产成人免费在线视频| 国产精品福利在线观看网址| 日本熟妇成熟毛茸茸| gogogo高清在线观看一区二区| 日韩欧美国产一区二区在线播放 | 亚洲精品护士| 久久精品中文字幕免费mv| 欧美高清性xxxx| 欧美a级大片在线| 欧美亚洲日本一区| 精品中文字幕av| 国产调教视频在线观看| 国产婷婷精品av在线| 超碰97人人人人人蜜桃| 91麻豆视频在线观看| 91久久久久| 欧美丰满老妇厨房牲生活 | 好吊视频一二三区| 精品一区二区三区在线观看| 欧美影院久久久| 国产一级做a爱免费视频| 午夜久久免费观看| 一本大道久久加勒比香蕉| 国产xxxxxxxxx| 99re6热只有精品免费观看| 欧美日韩激情在线| www.色就是色| 日本精品在线中文字幕| 色综合色狠狠天天综合色| 国产精品久久..4399| 青青草原av在线| 亚洲精品自拍动漫在线| 国产美女视频免费| 精品51国产黑色丝袜高跟鞋| 国产精品素人一区二区| 亚洲精品久久久久久一区二区| 亚洲人午夜射精精品日韩| av成人老司机| 久久日韩精品| 国内精品在线视频| 亚洲国产成人在线| 亚洲黄色一区二区三区| 成黄免费在线| 日本一二三不卡| 亚洲欧洲三级| 国产成人无吗| 亚洲一区二区精品视频| 97在线国产视频| 绿色成人影院| 欧美系列在线观看| 伊人影院综合在线| 麻豆精品久久| 亚洲福利视频二区| 深爱五月激情网| 欧美色婷婷久久99精品红桃| 久久精品2019中文字幕| 欧美日韩国产精品综合 | 男人揉女人奶房视频60分| 桃花岛tv亚洲品质| 欧美日韩久久久久久| 久久综合在线观看| 高清日韩欧美| 亚洲欧美国产日韩天堂区| 国产三级在线观看完整版| 天天影视综合| 国语自产在线不卡| 亚洲精品久久久久久久蜜桃| 国产又黄又大久久| 精品国产一区二区三区免费| 福利视频在线导航| 伊人一区二区三区| 欧美亚洲一二三区| 欧美网站免费| 精品国产91九色蝌蚪| xxx在线播放| 雨宫琴音一区二区三区| 91av免费观看91av精品在线| 中文字幕av资源| 丁香一区二区三区| 视频一区视频二区视频| 国产精品偷拍| 欧美三级韩国三级日本一级| 免费在线观看日韩av| 国产精品免费不| 九九视频直播综合网| 7799精品视频天天看| 国产精品综合av一区二区国产馆| 久久99影院| 最近中文字幕免费mv2018在线| 福利视频一区二区| 秋霞午夜鲁丝一区二区| 国内精品久久久久久久影视简单 | 久久精品国产亚洲AV无码男同| 日韩精品一区第一页| 国产成人av一区二区三区| 成人高清免费观看mv| 亚洲mv大片欧洲mv大片精品| 污网站在线免费| 国产99久久精品一区二区300| 欧美日韩成人在线播放| 亚洲午夜激情视频| 久久综合久久鬼色| 国产一线二线三线女| 欧美黄色a视频| 欧美性生活一级| 色综合天天做天天爱| 99热这里只有精品2| 欧美美女一区| 人九九综合九九宗合| 成人免费视频国产| 亚洲欧美一区二区三区国产精品| 日韩手机在线观看视频| 欧美黑人巨大videos精品| 九九热99久久久国产盗摄| 一级做a爰片久久毛片16| 国产日韩欧美制服另类| 国产成人在线免费看| 国产精品主播在线观看| 欧美床上激情在线观看| 国产又粗又猛视频免费| 中文字幕精品一区| 成人免费xxxxx在线视频| 日韩a级大片| 午夜精品久久久久久久白皮肤| 亚洲第一色视频| 亚洲一区二区成人在线观看| xxxx国产视频| 亚洲私拍自拍| 国产色综合一区二区三区| 欧美xxxx黑人又粗又长| 精品少妇一区二区三区免费观看 | 久久99国产精一区二区三区| 午夜精品久久久久久久99热浪潮| 亚洲老妇色熟女老太| 亚洲人成网站精品片在线观看| www.日本一区| 国产精品国产一区| 成人写真福利网| 国产黄色在线观看| 日韩片之四级片| 美女视频黄免费| 成人永久看片免费视频天堂| 17c丨国产丨精品视频| 日韩免费一级| 久久琪琪电影院| 凸凹人妻人人澡人人添| 欧美日韩国产中字| 给我免费观看片在线电影的| 国产麻豆综合| 日韩一二三区不卡在线视频| 国产一区二区主播在线| 视频在线观看99| 精品久久人妻av中文字幕| 亚洲午夜久久久久中文字幕久| 中文字幕a在线观看| 香蕉久久国产| 亚洲精品国产一区| 久久久久久久久成人| 久久久亚洲福利精品午夜| 天堂中文在线8| 欧美日韩在线播放三区| 欧美成人精品欧美一| 91网站黄www| 黄色在线视频网| 综合天堂久久久久久久| 国产日韩久久| 成人国产综合| 欧美激情欧美激情在线五月| 欧美在线观看在线观看| 7777精品伊人久久久大香线蕉超级流畅 | 国内自拍在线观看| 欧美一区二区三区高清视频| 成人国产精品av| 99riav视频在线观看| 国产性色av一区二区| 国产黄a三级三级三级| 欧美色另类天堂2015| 欧美日韩色视频| 91亚洲永久精品| 亚洲精品免费一区亚洲精品免费精品一区| 精久久久久久| 亚洲一区高清| 青青草这里只有精品| 国产啪精品视频| 黄色在线免费观看网站| 久久精品视频一| 欧美成熟毛茸茸| 日韩欧美专区在线| 性高潮视频在线观看| 亚洲一区二区中文在线| 国产毛片久久久久久久| 国产成人在线看| www.99在线| 亚洲日本久久| 波多野结衣三级在线| 伊人成综合网yiren22| 91成人理论电影| 嫩草伊人久久精品少妇av杨幂| 久久久久久久亚洲精品| 麻豆传媒在线免费| 国产一区二区三区久久精品| 内射后入在线观看一区| 欧美日韩你懂得| 四虎成人在线观看| 亚洲午夜一区二区三区| xxxx日本少妇| 成人免费视频在线观看| 亚洲欧洲久久久| av激情综合网| 国产女人18毛片水真多18 | 男男做爰猛烈叫床爽爽小说| 激情丁香综合五月| 爱情岛论坛vip永久入口| 国产日韩亚洲| 无码人妻少妇伦在线电影| 女人香蕉久久**毛片精品| 一本色道久久综合亚洲精品婷婷| 精品99在线| 欧美一区二区三区电影在线观看 | 影音先锋在线亚洲| 奇米狠狠一区二区三区| 麻豆成人在线播放| 久久综合五月婷婷| 国产在线一区二区三区播放| 91精品尤物| 国产成人成网站在线播放青青 | 欧美日韩在线观看一区| 嫩草国产精品入口| 精品国产日本| 日韩a级大片| 久久久久久九九九九| 黄色成人美女网站| 精品高清视频| 亚洲丝袜美腿一区| 欧美日韩国产精品一区二区| 在线日韩网站| 日日夜夜精品网站| 日韩久久综合| 免费成人进口网站| 欧美激情视频一区二区三区在线播放 | 三级男人添奶爽爽爽视频 | 国精产品视频一二二区| 国产精品美女久久久久久久| 天堂资源在线视频| 18成人在线观看| 免费视频一二三区| 亚洲福利一区二区| 欧美亚洲精品天堂| 色94色欧美sute亚洲13| 中文字幕永久免费视频| 欧美二区三区的天堂| 精品国产99久久久久久宅男i| 欧美不卡一区二区三区| 天天干,天天操,天天射| 亚洲欧洲美洲在线综合| 91精品大全| 欧美成年人视频网站| 91吃瓜在线观看| 国产精品白嫩初高中害羞小美女| 欧美日韩免费电影| 999久久久| 在线亚洲a色| 日本老太婆做爰视频| 精品999网站| 热久久精品免费视频| 国产在线一区观看| 激情综合丁香五月| 国产精品丝袜黑色高跟| 免费中文字幕在线| 欧美日韩亚洲一区二区三区| 中文字幕一二三四| 欧美精品一区二区三区蜜臀| 黄色小视频在线观看| 萌白酱国产一区二区| 一二三四视频在线中文| 成人免费视频网址| 欧美a一欧美| 亚洲综合首页| 国产毛片久久| 久久人人爽人人片| 久久精品一区二区三区av| 九九热只有精品| 欧美丝袜丝交足nylons图片| 亚洲女人18毛片水真多| 丝袜美腿亚洲一区二区| 超碰在线cao| 91丝袜美腿美女视频网站| 国产不卡一二三区| 欧美日韩中文字幕在线播放| 日韩成人伦理电影在线观看| 绯色av蜜臀vs少妇| 国产精品视频看| 日韩 欧美 综合| 日韩精品在线一区| 超碰免费在线| 欧美一级成年大片在线观看| 日本一区二区三区电影免费观看 | 中文字幕一区二区久久人妻网站 | 亚洲AV无码成人精品一区| 鲁大师成人一区二区三区| 亚洲精品鲁一鲁一区二区三区| 欧美韩国日本不卡| 午夜精品久久久久久久久久久久久蜜桃| 欧美日本在线观看| 国产一区二区三区福利| 久久免费福利视频| 综合视频一区| 亚洲天堂精品在线观看| 欧美激情亚洲色图| 欧美日韩裸体免费视频| 二区三区在线视频| 欧美成人精品一区二区三区| 欧美aaaaaaaa| 亚洲福利av在线| 日韩精品亚洲专区| 91av在线免费| 黑人巨大精品欧美一区二区三区 | 欧美特黄aaaaaaaa大片| 97在线电影| 欧美视频网站| www.四虎精品| 一区二区免费视频| 精品人妻伦一区二区三区久久| 久久精品99久久香蕉国产色戒| 国产69精品久久久久按摩| 日韩欧美亚洲日产国| 日韩高清在线观看| 欧美特级黄色录像| 91福利小视频| av中文字幕一区二区三区| 国产精品久久久久久久久男| 日韩成人精品一区| 自拍偷拍 国产| 中文字幕日韩一区| 97人妻精品一区二区三区软件| www.xxxx欧美| 久久精品九色| 可以看毛片的网址| 9人人澡人人爽人人精品| 中文字幕精品三级久久久| 亚洲精品视频免费| 蜜桃精品在线| 一区二区三区三区在线| 国产一区二区三区在线观看免费| 91视频综合网| 亚洲国产精品va在线观看黑人| 白浆视频在线观看| 欧洲一区二区日韩在线视频观看免费 | 亚洲欧美日韩免费| 91精品国产91久久久久福利| 婷婷综合福利| 日本xxxx黄色| 夜夜嗨av一区二区三区四季av| 成人毛片在线免费观看| 欧美亚洲国产视频小说| 欧美日韩中文字幕一区二区三区 | 精人妻无码一区二区三区| 一区二区欧美日韩视频| 欧美一级做a| 欧美黄色免费网址| 91在线视频免费91| 亚洲午夜无码久久久久| 久久国产精品视频| 国产成人精品亚洲线观看| 热久久精品国产| 日韩美女视频一区| 午夜av免费在线观看| 国产精品成人播放| 亚洲五月综合| 国产美女视频免费观看下载软件| 欧美这里有精品| 日本资源在线| 欧美中文娱乐网| 国产精品456露脸| 五月婷婷视频在线| 久久综合色88| 国产亚洲欧美日韩在线观看一区二区 | 一根才成人网| 欧美大片免费播放| 国产欧美日韩视频一区二区| www.黄色国产|