DEVELOPMENT SYSTEM OF APPLICATION SECURITY TESTING Done by: Kovalenko E. Akimbayev A. Ashimzhanova D. Research Advisor: Amanzholova S.T Reviewer: Shaykulova A. A Almaty 2022 The main goal and tasks The main goal of the project is to develop a system for checking applications for security vulnerabilities and issuing recommendations for elimination. Tasks: - Analyze in detail all the requirements for the needed knowledge, information, and any aspects that will affect it . - Determine the necessary technologies, tools, and platforms to create an application security testing system. - Develop or modify an algorithm for checking the code for security vulnerabilities. - Provide testing of the application security testing system. 02 Team members Akimbayev Amir • • • • Web structure SAST Front-end JSON Formatting CSRF session security with cookies Kovalenko Emil • Base64 encrypting • Custom regex/semantic search rules • Database interaction • Options management Ashimzhanova Dilnaz • Compliance vulnerabilities with pattern matching • TOTP authenthification/SMTP • RBAC permission hierarchy • DC flow analysis 03 Novelty&Relevance 4 000 3 000 2 000 1 000 0 2017 2018 2019 2020 AST integration statistics 2021 04 Analogues Name of product Date of foundation Location Advantages Disadvantages HCL Appscan 1991 India, USA Cloud and on-premise deployment. Less False positive case Expensive product Synopsys 1986 California, USA First place in the Gartner of Application Security Testing Expensive product. Not good support and sale system PT Application Inspector 2002 Russia Solution is Russia made, has a Russian interface The solution is in the progress of evolve Solar appScreener 2015 Russia Has a russian interface, Deobfuscation of code The solution have cases with false positive SonarQube 2008 Switzerland Have free package Taking more care about code quality than code security Checkmarx 2006 Israel Have a good database Expensive product of security vulnerabilities Veracode 2006 USA Have possibilities to Only a cloud solution, not on-premise integrate with different systems 05 Architecture of the system 06 06 Workflow & user possibilities 07 02 ER DIAGRAM & Sqlite 08 Corporate security features • • • • • • • • • • • Security search custom patterns SAST integration Regex analysis Semantic analysis Base64 Encrypting CSRF session security with cookies Encryption SSL/HTTPS RBAC permission hierarchy Host OS Validation JSON Security TOTP EternalSec 09 Login & Home page 10 Project page 11 Vulnerability page 12 Dashboard page 13 Option page 14 THANK YOU FOR ATTENTION