{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T07:37:08Z","timestamp":1726472228863},"reference-count":24,"publisher":"Elsevier BV","issue":"3-4","license":[{"start":{"date-parts":[[2010,5,1]],"date-time":"2010-05-01T00:00:00Z","timestamp":1272672000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Digital Investigation"],"published-print":{"date-parts":[[2010,5]]},"DOI":"10.1016\/j.diin.2010.01.005","type":"journal-article","created":{"date-parts":[[2010,2,12]],"date-time":"2010-02-12T09:47:04Z","timestamp":1265968024000},"page":"95-103","source":"Crossref","is-referenced-by-count":12,"title":["Using a software exploit to image RAM on an embedded system"],"prefix":"10.1016","volume":"6","author":[{"given":"J.R.","family":"Rabaiotti","sequence":"first","affiliation":[]},{"given":"C.J.","family":"Hargreaves","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"49","key":"10.1016\/j.diin.2010.01.005_bib1","article-title":"Smashing the stack for fun and profit","volume":"7","author":"AlephOne","year":"1996","journal-title":"Phrack"},{"author":"BadServo","key":"10.1016\/j.diin.2010.01.005_bib2"},{"author":"Belvedere","key":"10.1016\/j.diin.2010.01.005_bib3"},{"key":"10.1016\/j.diin.2010.01.005_bib4","unstructured":"Boileau A. Hit by a bus: physical access attacks with firewire. In: Presentation at Ruxcon; 2006."},{"key":"10.1016\/j.diin.2010.01.005_bib5","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1080\/15567280701417991","article-title":"Xbox forensics","volume":"1","author":"Burke","year":"2006","journal-title":"Journal of Digital Forensic Practice"},{"key":"10.1016\/j.diin.2010.01.005_bib6","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1016\/j.diin.2003.12.001","article-title":"A hardware-based memory acquisition procedure for digital investigations","volume":"1","author":"Carrier","year":"2004","journal-title":"Digital Investigation"},{"key":"10.1016\/j.diin.2010.01.005_bib7","unstructured":"Collins D. XFT\u2013a forensic analysis tool for the microsoft Xbox game console. In: Proceedings of the 6th annual security conference, April 11\u201312, 2007, Las Vegas, NV."},{"author":"Free60 Project","key":"10.1016\/j.diin.2010.01.005_bib20"},{"author":"Free60 Project","key":"10.1016\/j.diin.2010.01.005_bib21"},{"key":"10.1016\/j.diin.2010.01.005_bib9","doi-asserted-by":"crossref","unstructured":"Halderman JA, Schoen SD, Heninger N, Clarkson W, Paul W, Calandrino JA, et\u00a0al. Lest we remember: cold boot attacks on encryption keys. In: 17th USENIX security symposium; 2008.","DOI":"10.1145\/1506409.1506429"},{"year":"2003","series-title":"Hacking the Xbox","author":"Huang","key":"10.1016\/j.diin.2010.01.005_bib10"},{"year":"2002","series-title":"Intel low pin count (LPC) interface specification, revision 1.1","author":"Intel","key":"10.1016\/j.diin.2010.01.005_bib11"},{"year":"1997","series-title":"RFC 2104: keyed-hashing for message authentication","author":"Krawczyk","key":"10.1016\/j.diin.2010.01.005_bib12"},{"key":"10.1016\/j.diin.2010.01.005_bib13","first-page":"355","article-title":"Mac OS X, iPod, and iPhone forensic analysis DVD toolkit","author":"Kubasiak","year":"2009","journal-title":"Syngress"},{"key":"10.1016\/j.diin.2010.01.005_bib14","unstructured":"Robinson A. XBE file format 1.1. Tech. Rep., http:\/\/www.caustik.com\/cxbx\/download\/xbe.htm; 2005 [accessed 15.12.09] \u2013 this page is undated, but the Xbox Linux Wiki page containing the same information (http:\/\/www.xbox-linux.org\/wiki\/XBE_File_Format) was first published on 13th July 2005."},{"key":"10.1016\/j.diin.2010.01.005_bib15","unstructured":"Steil M. 17 Mistakes microsoft made in the Xbox security system. In: Proceedings of the 22nd chaos communication congress; 2005."},{"key":"10.1016\/j.diin.2010.01.005_bib16","unstructured":"Steil M, Jilli D, Esser S, Lehner F, Mears J, Hucek E. Xbox software hacking. In: Presentation given at 20th chaos communications congress, http:\/\/sourceforge.net\/projects\/xbox-linux\/files\/Presentations\/20thC%haosCommunicationCongress\/20C3-Xbox_Software_Hacking.pdf\/download; December 2003 [accessed 18.12.09]."},{"key":"10.1016\/j.diin.2010.01.005_bib17","unstructured":"Steil M, Pye D, et al, 2006. The Xbox linux project FAQ. Wiki article, http:\/\/www.xbox-linux.org\/wiki\/FAQ, page last updated 6th February 2006, [accessed 15.12.09]."},{"key":"10.1016\/j.diin.2010.01.005_bib18","unstructured":"Steil M, Pye D, et al, 2007. Software method HOWTO. Xbox Linux Wiki entry, http:\/\/www.xbox-linux.org\/wiki\/Software_Method_HOWTO, last updated 17th December 2007 [accessed 15.12.09]."},{"key":"10.1016\/j.diin.2010.01.005_bib19","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1016\/j.diin.2004.07.006","article-title":"Xbox security issues and forensic recovery methodology (using Linux)","volume":"1","author":"Vaughan","year":"2004","journal-title":"Digital Investigation"},{"author":"Wiibrew","key":"10.1016\/j.diin.2010.01.005_bib22"},{"author":"Wiibrew","key":"10.1016\/j.diin.2010.01.005_bib23"},{"author":"Wiibrew","key":"10.1016\/j.diin.2010.01.005_bib24"},{"author":"Xbox-Scene News","key":"10.1016\/j.diin.2010.01.005_bib25"}],"container-title":["Digital Investigation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1742287610000071?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1742287610000071?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,5,25]],"date-time":"2019-05-25T22:51:25Z","timestamp":1558824685000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1742287610000071"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,5]]},"references-count":24,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2010,5]]}},"alternative-id":["S1742287610000071"],"URL":"https:\/\/doi.org\/10.1016\/j.diin.2010.01.005","relation":{},"ISSN":["1742-2876"],"issn-type":[{"type":"print","value":"1742-2876"}],"subject":[],"published":{"date-parts":[[2010,5]]}}}