Tagged articles
9 articles
Page 1 of 1
FunTester
FunTester
Jul 28, 2025 · Information Security

Unlocking App Security: How SAST, DAST, IAST, and RASP Protect Your Code

This article explores the core principles, strengths, and limitations of four major application security testing approaches—Static (SAST), Dynamic (DAST), Interactive (IAST), and Runtime Application Self‑Protection (RASP)—and compares them in a concise table to guide developers in building a comprehensive security strategy.

Application SecurityDASTDevSecOps
0 likes · 8 min read
Unlocking App Security: How SAST, DAST, IAST, and RASP Protect Your Code
Meituan Technology Team
Meituan Technology Team
Jan 18, 2024 · Information Security

Meituan Java RASP: Architecture, Challenges, and Performance Optimizations

The article details Meituan's large‑scale RASP (Runtime Application Self‑Protection) rollout, covering deployment challenges such as heterogeneous Java environments, performance impact of agent injection, upgrade difficulties, monitoring complexities, and the engineering solutions—including agentmain/premain hybrid loading, gray‑scale upgrades, hot‑update plugin architecture, and performance optimizations—validated with concrete metrics and benchmarks.

Gray DeploymentHot UpdateInstrumentation
0 likes · 31 min read
Meituan Java RASP: Architecture, Challenges, and Performance Optimizations
JD Tech
JD Tech
May 26, 2023 · Information Security

JD Cloud RASP Runtime Application Self‑Protection: Architecture, Principles, and Best Practices

This article examines JD Cloud's Runtime Application Self‑Protection (RASP) technology, detailing its background, architecture, working principles, security advantages over traditional WAF and SAST/DAST, practical 0‑day protection examples, deployment scenarios, operational practices, and real‑world performance in large‑scale promotions and national‑level cyber‑exercises.

Application SecurityCloud NativeRASP
0 likes · 14 min read
JD Cloud RASP Runtime Application Self‑Protection: Architecture, Principles, and Best Practices
DevOps Cloud Academy
DevOps Cloud Academy
Jun 5, 2022 · Information Security

Critical Remote Code Execution Vulnerability CVE-2022-26134 in Atlassian Confluence – Description, Impact, and Mitigation Steps

Atlassian Confluence suffers a severe, easily exploitable remote code execution flaw (CVE-2022-26134) that allows unauthenticated attackers to run arbitrary commands, affecting multiple versions and prompting both official upgrade recommendations and detailed temporary mitigation procedures, while Xmirror's Cloud Shark RASP offers innate protection.

CVE-2022-26134ConfluenceRASP
0 likes · 9 min read
Critical Remote Code Execution Vulnerability CVE-2022-26134 in Atlassian Confluence – Description, Impact, and Mitigation Steps
Alibaba Cloud Native
Alibaba Cloud Native
Dec 16, 2021 · Information Security

Why RASP Outperforms Traffic‑Based Defenses Against Log4j2 Exploits

The Log4j2 remote code execution flaw is hard to contain because it enables arbitrary code execution and hides its traffic signatures, but Runtime Application Self‑Protection (RASP) can detect malicious behavior at the application level, offering low false‑positives and automatic component discovery without relying on constantly updated rules.

Cloud NativeJavaRASP
0 likes · 9 min read
Why RASP Outperforms Traffic‑Based Defenses Against Log4j2 Exploits
Alibaba Cloud Native
Alibaba Cloud Native
Dec 13, 2021 · Information Security

How to Block Log4j2 RCE Attacks in Four Simple Steps with Alibaba Cloud ARMS

The article explains the massive impact of the Log4j2 remote code execution vulnerability, details why its JNDI lookup is easily exploitable, lists affected software, and provides a concise four‑step guide using Alibaba Cloud ARMS RASP to detect, monitor, and block attacks while offering remediation recommendations.

ARMSCloud NativeRASP
0 likes · 6 min read
How to Block Log4j2 RCE Attacks in Four Simple Steps with Alibaba Cloud ARMS
Ctrip Technology
Ctrip Technology
Oct 15, 2020 · Information Security

Deploying OpenRASP IAST at Ctrip: Architecture, Challenges, and Data‑Pollution Prevention via Bytecode Instrumentation

This article describes Ctrip's practical deployment of OpenRASP‑based IAST, outlines the challenges of data pollution caused by traffic replay, and presents a Java bytecode instrumentation solution that intercepts SocketOutputStream writes to prevent dirty data from persisting in databases, caches, and message queues.

IASTJavaOpenRASP
0 likes · 9 min read
Deploying OpenRASP IAST at Ctrip: Architecture, Challenges, and Data‑Pollution Prevention via Bytecode Instrumentation