Fig. 2From: A flexible framework for mobile device forensics based on cold boot attacksThe BMA wrapped into an Android boot imageBack to article page