SlideShare a Scribd company logo
Mobile testing
IAST – A Simple Solution To Mobile Security Testing
Florin Coada
IBM Security
2 IBM Security
About the speaker
Florin N. Coada
IBM Security
United Kingdom
Features:
1. 4.5 years with IBM doing security
2. Likes video Games
3. Will not answer random emails
3 IBM Security
What’s IAST?
• Interactive Application Security Testing
̶ Not quite DAST and not quite SAST
̶ “Behavioural analysis”
• Analyse an application in an instrumented environment and observe the behaviour to
detect potential vulnerabilities
ASoC - Mobile Analyser
Instrumented environment
4 IBM Security
Terminology
• SAST = Static Application Security Testing
• DAST = Dynamic Application Security Testing
• SDLC = Software Development Lifecycle
• ASoC = Application Security on Cloud
• Noise = findings that are not interesting
• False positive = False finding reported by the tool
5 IBM Security
Mobile Apps
• So… there’s more than 1 type of apps
Native Apps Hybrid apps Web view apps
6 IBM Security
& Web ServicesMobile Apps
• Most web apps will have some form of business logic provided by a back end service
Business logic
Presentation
•Device Authentication
•Environment analysis
•Runtime protection
•Device Authentication
•Serve dynamic content
•Improves app rendering
•Basically a bookmark
Authentication
7 IBM Security
Testing strategies: {sast}
• Native layer code can be handled with SAST
• Pros:
̶ Can run it shortly after building the app
̶ Fast (once you set it up)
̶ Could potentially test both the service and the app
• Cons:
̶ Takes a while to set up
̶ Doesn’ttake into account the platform
̶ Can’t keep up with the language updates
̶ Noise and false positives
̶ Not a lot of value for web view apps
Data Source Sink
8 IBM Security
Testing strategies: {dast}
• Web services logic can be tested using DAST
• A running web service
• Test account
• Disable 3rd party security systems
• Access from the test system to the
app
9 IBM Security
Testing strategies: {dast}
• Web services logic can be tested using DAST
• Pros:
̶ Can find vulnerabilities in the logic layer
̶ Language agnostic
̶ Can be automated without using the app
• Cons:
̶ You’re not actually testing the app
̶ Noise and false positives
̶ Not a lot of value for native apps
Proxy
DAST Scanner
Recorded data
10 IBM Security
Testing strategies: {iast}
• IAST will enable you to test both parts of the app at the same time
• Pros:
̶ Testthe app and some of the back end at the same time
̶ Easy to run (drag and drop)
̶ Can detected issues in the context of the platform being used
̶ Can be automated
• Cons:
̶ Complexlog-in mechanisms are hard to scan
ASoC - Mobile Analyser
Instrumented environment
11 IBM Security
Testing strategies: {iast}
12 IBM Security
Choosing the right one for you
• SAST : Difficult but works on both
• DAST : Fairly easy to set up, but only for web service
• IAST : Does a bit of both, very easy to use
• More “actionable” results
• Easier to understand
• Does a combination of both of the above
• Very easy to use
13 IBM Security
Questions?
Питання?
ibm.com/security
securityintelligence.com
xforce.ibmcloud.com
@ibmsecurity
youtube/user/ibmsecuritysolutions
© Copyright IBM Corporation 2018. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind,
express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products
and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service
marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your
enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others.
No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems,
products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products
or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.
FOLLOW US ON:
THANK YOU
BACKUP
16 IBM Security
Sample results

More Related Content

PDF
3 florin coada - sast in the days of dev ops
PDF
Assessing IBM i Security Risks: A Conversation with Dan Riehl
PPT
IBM Rational AppScan Product Overview
PDF
Fixico presentation
PPTX
Essential Layers of IBM i Security: System-Access Security
PPT
IBM AppScan - the total software security solution
PDF
Mobility Training Series : Mobility 301 protect
PPTX
Were we Just Hacked? Applying Digital Forensic Techniques for your Industrial...
3 florin coada - sast in the days of dev ops
Assessing IBM i Security Risks: A Conversation with Dan Riehl
IBM Rational AppScan Product Overview
Fixico presentation
Essential Layers of IBM i Security: System-Access Security
IBM AppScan - the total software security solution
Mobility Training Series : Mobility 301 protect
Were we Just Hacked? Applying Digital Forensic Techniques for your Industrial...

What's hot (20)

PPTX
Sharing Plant Data with Phones, Tablets and the Cloud (Englsh)
PDF
mHealth Summit EU 2015
PDF
CSF18 - How to Block Ransomware - Sami Laiho
PPTX
Android Security
PDF
New VIPRE_DS_EndpointSecurity_2016
PPTX
Securing the continuous integration
PPTX
Signature Enterprise
PDF
5 Important Secure Coding Practices
PDF
Top 5 Reasons to Choose Adaptive SSO
PDF
Cyber security webinar 6 - How to build systems that resist attacks?
PPT
Security what it means to your business - circa 1999
PPT
Automated Penetration Testing With Core Impact
PDF
CSF18 - Moving from Reactive to Proactive Security - Sami Laiho
PDF
Core Impact Pro R1-Release Overview
PDF
9. Vulnerability Assessments-cyber51
PPTX
BalaBit 2015: Control Your IT Staff
PDF
Securing legacy systems
PPTX
Canadian Cyber Cecurity
PDF
Best Practices in IBM i Security
PPTX
IBM i Security Best Practices
Sharing Plant Data with Phones, Tablets and the Cloud (Englsh)
mHealth Summit EU 2015
CSF18 - How to Block Ransomware - Sami Laiho
Android Security
New VIPRE_DS_EndpointSecurity_2016
Securing the continuous integration
Signature Enterprise
5 Important Secure Coding Practices
Top 5 Reasons to Choose Adaptive SSO
Cyber security webinar 6 - How to build systems that resist attacks?
Security what it means to your business - circa 1999
Automated Penetration Testing With Core Impact
CSF18 - Moving from Reactive to Proactive Security - Sami Laiho
Core Impact Pro R1-Release Overview
9. Vulnerability Assessments-cyber51
BalaBit 2015: Control Your IT Staff
Securing legacy systems
Canadian Cyber Cecurity
Best Practices in IBM i Security
IBM i Security Best Practices
Ad

Similar to Florin Coada: MOBILE TESTING - A SIMPLE SOLUTION TO YOUR MOBILE SECURITY TESTING (20)

PPTX
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
PDF
4 florin coada - dast automation, more value for less work
PPTX
Are We There Yet? The Path Towards Securing the Mobile Enterprise
PPTX
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
PPTX
Security in the Cognitive Era: Why it matters more than ever
PDF
Simple and secure mobile cloud access
PPTX
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
PDF
2015 Mobile Security Trends: Are You Ready?
PPTX
Are You Ready to Move Your IAM to the Cloud?
PPTX
Mobility 201 : Productivity
PPT
MDM is not Enough - Parmelee
PPTX
Mobility 101 : Provision
PPTX
IBM Security Portfolio - 2015
PPTX
Mobility 301 : Protect
PDF
IBM Security SaaS IaaS and PaaS
PDF
IBM Security 2017 Lunch and Learn Series
PDF
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
PPTX
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
PPSX
IBM: Cognitive Security Transformation for the Enrgy Sector
PDF
IBM - IAM Security and Trends
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
4 florin coada - dast automation, more value for less work
Are We There Yet? The Path Towards Securing the Mobile Enterprise
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
Security in the Cognitive Era: Why it matters more than ever
Simple and secure mobile cloud access
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
2015 Mobile Security Trends: Are You Ready?
Are You Ready to Move Your IAM to the Cloud?
Mobility 201 : Productivity
MDM is not Enough - Parmelee
Mobility 101 : Provision
IBM Security Portfolio - 2015
Mobility 301 : Protect
IBM Security SaaS IaaS and PaaS
IBM Security 2017 Lunch and Learn Series
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
IBM: Cognitive Security Transformation for the Enrgy Sector
IBM - IAM Security and Trends
Ad

More from Ievgenii Katsan (20)

PDF
8 andrew kalyuzhin - 30 ux-advices, that will make users love you
PDF
5 hans van loenhoud - master-class the 7 skills of highly successful teams
PDF
4 alexey orlov - life of product in startup and enterprise
PDF
3 dmitry gomeniuk - how to make data-driven decisions in saa s products
PDF
7 hans van loenhoud - the problem-goal-solution trinity
PDF
1 hans van loenhoud -
PDF
3 denys gobov - change request specification the knowledge base or the task...
PDF
5 victoria cupet - learn to play business analysis
PDF
5 alina petrenko - key requirements elicitation during the first contact wi...
PDF
3 karabak kuyavets transformation of business analyst to product owner
PDF
4 andrii melnykov - stakeholder management for pd ms and b-as and why it is...
PDF
3 zornitsa nikolova - the product manager between decision making and facil...
PDF
4 viktoriya gudym - how to effectively manage remote employees
PDF
9 natali renska - product and outsource development, how to cook 2 meals in...
PDF
7 denis parkhomenko - from idea to execution how to make a product that cus...
PDF
6 anton vitiaz - inside the mvp in 3 days
PDF
5 mariya popova - ideal product management. unicorns in our reality
PDF
2 victor podzubanov - design thinking game
PDF
3 sergiy potapov - analyst to product owner
PDF
4 anton parkhomenko - how to make effective user research with no budget at...
8 andrew kalyuzhin - 30 ux-advices, that will make users love you
5 hans van loenhoud - master-class the 7 skills of highly successful teams
4 alexey orlov - life of product in startup and enterprise
3 dmitry gomeniuk - how to make data-driven decisions in saa s products
7 hans van loenhoud - the problem-goal-solution trinity
1 hans van loenhoud -
3 denys gobov - change request specification the knowledge base or the task...
5 victoria cupet - learn to play business analysis
5 alina petrenko - key requirements elicitation during the first contact wi...
3 karabak kuyavets transformation of business analyst to product owner
4 andrii melnykov - stakeholder management for pd ms and b-as and why it is...
3 zornitsa nikolova - the product manager between decision making and facil...
4 viktoriya gudym - how to effectively manage remote employees
9 natali renska - product and outsource development, how to cook 2 meals in...
7 denis parkhomenko - from idea to execution how to make a product that cus...
6 anton vitiaz - inside the mvp in 3 days
5 mariya popova - ideal product management. unicorns in our reality
2 victor podzubanov - design thinking game
3 sergiy potapov - analyst to product owner
4 anton parkhomenko - how to make effective user research with no budget at...

Recently uploaded (20)

PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Pre independence Education in Inndia.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
01-Introduction-to-Information-Management.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
master seminar digital applications in india
PPTX
Institutional Correction lecture only . . .
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Insiders guide to clinical Medicine.pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
Cell Structure & Organelles in detailed.
PDF
Classroom Observation Tools for Teachers
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
Cell Types and Its function , kingdom of life
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPH.pptx obstetrics and gynecology in nursing
Pre independence Education in Inndia.pdf
human mycosis Human fungal infections are called human mycosis..pptx
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
01-Introduction-to-Information-Management.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
master seminar digital applications in india
Institutional Correction lecture only . . .
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Insiders guide to clinical Medicine.pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Cell Structure & Organelles in detailed.
Classroom Observation Tools for Teachers
Anesthesia in Laparoscopic Surgery in India
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Cell Types and Its function , kingdom of life
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Microbial disease of the cardiovascular and lymphatic systems

Florin Coada: MOBILE TESTING - A SIMPLE SOLUTION TO YOUR MOBILE SECURITY TESTING

  • 1. Mobile testing IAST – A Simple Solution To Mobile Security Testing Florin Coada IBM Security
  • 2. 2 IBM Security About the speaker Florin N. Coada IBM Security United Kingdom Features: 1. 4.5 years with IBM doing security 2. Likes video Games 3. Will not answer random emails
  • 3. 3 IBM Security What’s IAST? • Interactive Application Security Testing ̶ Not quite DAST and not quite SAST ̶ “Behavioural analysis” • Analyse an application in an instrumented environment and observe the behaviour to detect potential vulnerabilities ASoC - Mobile Analyser Instrumented environment
  • 4. 4 IBM Security Terminology • SAST = Static Application Security Testing • DAST = Dynamic Application Security Testing • SDLC = Software Development Lifecycle • ASoC = Application Security on Cloud • Noise = findings that are not interesting • False positive = False finding reported by the tool
  • 5. 5 IBM Security Mobile Apps • So… there’s more than 1 type of apps Native Apps Hybrid apps Web view apps
  • 6. 6 IBM Security & Web ServicesMobile Apps • Most web apps will have some form of business logic provided by a back end service Business logic Presentation •Device Authentication •Environment analysis •Runtime protection •Device Authentication •Serve dynamic content •Improves app rendering •Basically a bookmark Authentication
  • 7. 7 IBM Security Testing strategies: {sast} • Native layer code can be handled with SAST • Pros: ̶ Can run it shortly after building the app ̶ Fast (once you set it up) ̶ Could potentially test both the service and the app • Cons: ̶ Takes a while to set up ̶ Doesn’ttake into account the platform ̶ Can’t keep up with the language updates ̶ Noise and false positives ̶ Not a lot of value for web view apps Data Source Sink
  • 8. 8 IBM Security Testing strategies: {dast} • Web services logic can be tested using DAST • A running web service • Test account • Disable 3rd party security systems • Access from the test system to the app
  • 9. 9 IBM Security Testing strategies: {dast} • Web services logic can be tested using DAST • Pros: ̶ Can find vulnerabilities in the logic layer ̶ Language agnostic ̶ Can be automated without using the app • Cons: ̶ You’re not actually testing the app ̶ Noise and false positives ̶ Not a lot of value for native apps Proxy DAST Scanner Recorded data
  • 10. 10 IBM Security Testing strategies: {iast} • IAST will enable you to test both parts of the app at the same time • Pros: ̶ Testthe app and some of the back end at the same time ̶ Easy to run (drag and drop) ̶ Can detected issues in the context of the platform being used ̶ Can be automated • Cons: ̶ Complexlog-in mechanisms are hard to scan ASoC - Mobile Analyser Instrumented environment
  • 11. 11 IBM Security Testing strategies: {iast}
  • 12. 12 IBM Security Choosing the right one for you • SAST : Difficult but works on both • DAST : Fairly easy to set up, but only for web service • IAST : Does a bit of both, very easy to use • More “actionable” results • Easier to understand • Does a combination of both of the above • Very easy to use
  • 14. ibm.com/security securityintelligence.com xforce.ibmcloud.com @ibmsecurity youtube/user/ibmsecuritysolutions © Copyright IBM Corporation 2018. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party. FOLLOW US ON: THANK YOU