Lest we remember: cold boot attacks on encryption keys
SS'08 Proceedings of the 17th conference on Security symposium
Xbox security issues and forensic recovery methodology (utilising Linux)
Digital Investigation: The International Journal of Digital Forensics & Incident Response
A hardware-based memory acquisition procedure for digital investigations
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Versatile iPad forensic acquisition using the Apple Camera Connection Kit
Computers & Mathematics with Applications
iPhone social networking for evidence investigations using iTunes forensics
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication
An analysis of security vulnerabilities of the Xbox 360 and Xbox Live mobile network
International Journal of Mobile Network Design and Innovation
Memory encryption: A survey of existing techniques
ACM Computing Surveys (CSUR)
Hi-index | 0.00 |
The research in this paper is the result of a court case involving copyright infringement, specifically, a request for expert evidence regarding the proportion of copyrighted data present in the RAM of a games console. This paper presents a novel method to image the memory of an embedded device (a games console) where normal software and hardware memory imaging techniques are not possible. The paper describes how a buffer overflow exploit can be used in order to execute custom code written to create an image of the console's memory. While this work is concerned with the Microsoft Xbox, the principles of vulnerability enabled data acquisition could be extended to other embedded devices, including other consoles, smart phones and PDAs.