Description

Runtime protection, or Runtime Application Self-Protection (RASP), is an advanced security approach that integrates directly within an application's runtime environment, enabling it to detect, prevent, and respond to security threats in real-time. Unlike traditional security measures that act at the network or perimeter level, runtime protection operates from within the application itself, providing continuous monitoring of application behavior and identifying malicious activity as it occurs. This approach allows RASP to immediately block attacks like SQL injection, cross-site scripting (XSS), and other exploit attempts, even if vulnerabilities are present in the application code. By securing the application from the inside, runtime protection ensures that threats are mitigated dynamically, offering a critical layer of security tailored to the unique needs of each application and adapting to new threats as they emerge.  Aarno Labs has a long history of developing runtime protection systems including systems that protect against injections via low-cost taint analysis and systems that enforce fine-grained privileges for libraries of a single application.

Solutions

  • Lucien: Supply Chain Telemetry, Assessment, and Protection

Projects

ClearScope

Precise and comprehensive runtime monitoring of sensitive behaviors in Android apps.

PI: Michael Gordon

Technical Areas: Dynamic Analysis, Runtime Protection, Supply Chain Security, Vulnerability Discovery

Saran

Instrumentation system for Android apps to track sensitive information and retrofit security policies.

PI: Jeff Perkins

Technical Areas: Static Analysis, Dynamic Analysis, Runtime Protection

Arya (TA3)

High-Assurance, Decentralized, Autonomous Agents for Neutralizing Botnets

PI: Michael Gordon

Technical Areas: Runtime Protection, Software Correctness, AI / ML, Vulnerability Remediation

Aria

Transforming AppSec with in-application, zero-trust privileges and secure computation offloading.

PI: Ricardo Baratto

Technical Areas: Runtime Protection, Supply Chain Security, Vulnerability Discovery, Vulnerability Remediation, Vulnerability Reachability

Recent Blog Posts and News

Papers