A hardware-based memory acquisition procedure for digital investigations

The acquisition of volatile memory from a compromised computer is difficult to perform reliably because the acquisition procedure should not rely on untrusted code, such as the operating system or ...