Security/Automation/WinterOfSecurity2014: Difference between revisions

Jump to navigation Jump to search
No edit summary
Line 10: Line 10:
* difficulty: high
* difficulty: high
* language: english or french
* language: english or french
The Mozilla InvestiGator (MIG) project needs a way to inspect the content of the memory of a system, and detect threats. The typical approach in memory forensic is to dump the memory of a system, and perform analysis on another system, using tools like Volatility. We are looking for an approach that is less invasive, where an agent running on a target system can inspect its own memory without disrupting operations. Existing libraries, such as Volatility, as hard to ship to remote system. The goal of this project is to design and build a lean, cross-platform, memory inspection library in the Go language that can be integrating into MIG.
The Mozilla InvestiGator (MIG) project needs a way to inspect the content of the memory of a system, and detect threats. The typical approach in memory forensic is to dump the memory of a system, and perform analysis on another system, using tools like Volatility. We are looking for an approach that is less invasive, where an agent running on a target system can inspect its own memory without disrupting operations. Existing libraries, such as Volatility, are hard to ship to remote systems because of their size and dependencies. The goal of this project is to design and code a lean, cross-platform, memory inspection library in the Go language that can be integrated into MIG.


== Network Security ==
== Network Security ==
Confirmed users
529

edits

Navigation menu