Using a software exploit to image RAM on an embedded system
暂无分享,去创建一个
[1] A. One,et al. Smashing The Stack For Fun And Profit , 1996 .
[2] Andrew bunnie Huang. Hacking the Xbox , 2003 .
[3] Chris Vaughan. Xbox security issues and forensic recovery methodology (utilising Linux) , 2004, Digit. Investig..
[4] Michael Steil,et al. Mistakes Microsoft Made in the Xbox Security System , 2022 .
[5] Paul Burke,et al. Xbox Forensics , 2006, J. Digit. Forensic Pract..
[6] Joe Grand,et al. A hardware-based memory acquisition procedure for digital investigations , 2004, Digit. Investig..
[7] Ariel J. Feldman,et al. Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.
[8] Gary C. Kessler. Book Review: Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit , 2008, J. Digit. Forensics Secur. Law.