In which of the following attacks does an attacker dump memory by rebooting a victim's device with a malicious OS and then extract sensitive data from the dumped memory?
A iOS jailbreaking B OS data caching C Carrier-loaded software D User-initiated code