Research Article

Determining the Image Base of Smart Device Firmware for Security Analysis

Figure 5

Map firmware into memory.