We present embedded devices memory elements -
from core registers to off chip-use, type and architecture before
summarising their features regarding extraction techniques at
scale. We list recent and on-going attack platform methodologies
prior analysing their pros and cons. Particularly of importance,
we address combined attack approaches, signal processing techniques and the challenges of low cost extraction methodologies.
Above all, we characterise beam-based extraction techniques,
starting from sample preparation before concluding on in-situ
memory content extraction limits and countermeasures