Using a software exploit to image RAM on an embedded system
Joseph Rabaiotti and Christopher Hargreaves
Journal
Digital Investigation
Number
3−4
Pages
95–103
Volume
6
Year
2010
Joseph Rabaiotti and Christopher Hargreaves