Context
Security resources are scarce, and practitioners can benefit from guidance in the effective and efficient usage of tools and techniques to detect and prevent the exploitation of software vulnerabilities. Interactive Application Security Testing (IAST) is a vulnerability detection tool that combines static and dynamic testing using sensor modules and agents. Runtime Application Self-Protection (RASP) tools monitor an application’s behavior and block attempts to exploit existing vulnerabilities in a running application. IAST and RASP have not often been compared to well-established counterparts, such as Dynamic Application Security Testing (DAST), Static Application Security Testing (SAST), and penetration testing, particularly in the context of a large system.
Objective
The goal of this research is to aid practitioners in making informed choices about the use of Interactive Application Security Testing (IAST) and Runtime Application Self-Protection (RASP) tools through an analysis of their effectiveness and efficiency in comparison with other vulnerability detection and exploit prevention techniques and tools.
Methods
We apply IAST and RASP on OpenMRS, an open-source Java-based online medical records web application. We compare the efficiency and effectiveness of IAST and RASP with techniques applied on OpenMRS in prior work: Systematic (SMPT) and Exploratory (EMPT) Manual Penetration Testing techniques and SAST and DAST tools. We measure efficiency and effectiveness in terms of the number and type of vulnerabilities detected and prevented per hour.
Results
In the context of a large, enterprise-scale web application, our study shows that IAST performed second best in both efficiency and effectiveness. IAST’s efficiency (2.14 Vulnerabilities per Hour (Vph)) is second to EMPT’s (2.22 VpH). IAST found 91 (8%) unique vulnerabilities not found by other tools and techniques, with SAST finding 823 (71%) unique vulnerabilities. Regarding effectiveness, IAST detected 8 of the Top-10 OWASP web application security risks, compared to 9 by SMPT and 7 by EMPT, DAST, and SAST. Our results indicate that RASP only prevents Injection attacks in OpenMRS.
Conclusion
IAST is an efficient and effective tool that complements other vulnerability detection tools and techniques. RASP does not replace vulnerability detection but can prevent the exploitation of existing injection vulnerabilities in a running application.
Figures - available from: Empirical Software Engineering
This content is subject to copyright.
Terms and conditions apply.