Skip to main content

Using a software exploit to image RAM on an embedded system

Joseph Rabaiotti and Christopher Hargreaves

Journal
Digital Investigation
Number
3−4
Pages
95–103
Volume
6
Year
2010