In which of the following attacks does an attacker dump memory by rebooting a victim's device with a malicious OS and then extract sensitive data from the dumped memory?
A iOS jailbreaking
B OS data caching
C Carrier-loaded software
D User-initiated code