this is for holding javascript data
Igor.Korkin deleted figures/f2/f2.png
over 9 years ago
Commit id: 2e693fa77923fc7329cb698da5b7ec189f0d07fb
deletions | additions
diff --git a/figures/f2/f2.png b/figures/f2/f2.png
deleted file mode 100644
index 465a4a1..0000000
Binary files a/figures/f2/f2.png and /dev/null differ
diff --git a/layout.md b/layout.md
index e011494..ebe3afd 100644
--- a/layout.md
+++ b/layout.md
...
3.2. Details.tex
3.2.1. Basics.tex
3.2.2. Memory Dump Approach.tex
figures/f2/f2.png
3.2.2. Memory Dump Approach1.tex
2.2.4. Active Management Technology CodeOn computers supporting Active Management Technology (AMT), which is a part of Intel Management Engine (ME), another memory acquisition method can be implemented. AMT code is executed in additional process unit which is located either in the Northbridge or Southbridge. As a result this code is more privileged than VMX-root mode code or SMM code. The following papers cover this mode from the information security point of view [43, 44]. Due to the fact that malware can be executed in this mode [42, 45], we can state that memory dumping can operate in this mode too. Widespread use of this method in practice is hampered by the lack of comprehensive documentation on AMT and ME..tex