Runtime Application Self-Protection (RASP) is a security technology introduced by Gartner in 2012, that offers an additional layer of security by monitoring applications in real-time to detect suspicious activity. Unlike conventional security mechanisms, such as WAF and AV/EDR, RASP is integrated within the application, enabling it to closely monitor the application’s runtime environment and identify anomalies that may signal an attack. In this talk, we will explore how one can bypass RASP solutions, particularly for JVM-based applications.
Talk
Hijacking the Java Virtual Machine (JVM) and Bypassing Runtime Application Self-Protection (RASP)
April 25, 16:00 (CAMPUS)
Speaker
Mouad Kondah
I’m Mouad Kondah, a Senior Software Engineer at Kudelski Security and I am based in Lausanne. My work, academical background and interest encompasses a multitude of topics, examined from diverse perspectives.
I have a Bachelor’s degree in Mathematics from the University of Neuchâtel and a Master’s degree in Mathematics and Computer Science from the University of Geneva.
I have launched recently my own website: https://www.deep-kondah.com, where I'll be sharing in-depth knowledge about AI, cybersecurity, and software engineering.