کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
457962 696086 2010 9 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Using a software exploit to image RAM on an embedded system
کلمات کلیدی
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر شبکه های کامپیوتری و ارتباطات
پیش نمایش صفحه اول مقاله
Using a software exploit to image RAM on an embedded system
چکیده انگلیسی

The research in this paper is the result of a court case involving copyright infringement, specifically, a request for expert evidence regarding the proportion of copyrighted data present in the RAM of a games console. This paper presents a novel method to image the memory of an embedded device (a games console) where normal software and hardware memory imaging techniques are not possible. The paper describes how a buffer overflow exploit can be used in order to execute custom code written to create an image of the console's memory. While this work is concerned with the Microsoft Xbox, the principles of vulnerability enabled data acquisition could be extended to other embedded devices, including other consoles, smart phones and PDAs.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Digital Investigation - Volume 6, Issues 3–4, May 2010, Pages 95–103
نویسندگان
, ,