Abstract

This paper explains the fundamental concepts of Runtime Application Self-Protection Technology (RASP), a relatively new security method whose widespread use is envisaged in the near future. The ongoing focal point of this innovation is on Java and.NET stage weaknesses. In addition to typification, the paper discusses RASP's benefits and drawbacks. Despite its undeniable benefits, it is not an independent and comprehensive solution for software security. RASP provides an effective solution to avoid harmful actions when used in conjunction with tried and true traditional methods. In powerful web-based applications, script infusion weaknesses are exceptionally normal. To provide protection against distinct injection types, the necessary conditions for the production and exploitation of script injection vulnerabilities were examined. The statements were located with their types in the HTML statements using a combination of the host language and object language analysis. The information reliance connection subgraph with source and sink focuses was produced in light of the control stream diagram. For this sub-graph, a filter insertion technique is used to define multiple input data type filtering strategies. Then, using data flow analysis and intelligent filtering before important sink statements, a solution was built.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call