Using a software exploit to image RAM on an embedded system

The research in this paper is the result of a court case involving copyright infringement, specifically, a request for expert evidence regarding the proportion of copyrighted data present in the RAM of a games console. This paper presents a novel method to image the memory of an embedded device (a g...

Full description

Saved in:
Bibliographic Details
Published in:Digital investigation Vol. 6; no. 3; pp. 95 - 103
Main Authors: Rabaiotti, J.R., Hargreaves, C.J.
Format: Journal Article
Language:English
Published: Kidlington Elsevier Ltd 01.05.2010
Elsevier Science Ltd
Subjects:
ISSN:1742-2876, 1873-202X
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The research in this paper is the result of a court case involving copyright infringement, specifically, a request for expert evidence regarding the proportion of copyrighted data present in the RAM of a games console. This paper presents a novel method to image the memory of an embedded device (a games console) where normal software and hardware memory imaging techniques are not possible. The paper describes how a buffer overflow exploit can be used in order to execute custom code written to create an image of the console's memory. While this work is concerned with the Microsoft Xbox, the principles of vulnerability enabled data acquisition could be extended to other embedded devices, including other consoles, smart phones and PDAs.
Bibliography:SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 14
ISSN:1742-2876
1873-202X
DOI:10.1016/j.diin.2010.01.005