Difference between pages "Solid State Drive (SSD) Forensics" and "File:Windows-Mobile-6-Professional.jpg"

From Forensics Wiki
(Difference between pages)
Jump to: navigation, search
m
 
(Maintenance script uploaded "File:Windows-Mobile-6-Professional.jpg": Importing image file)
 
Line 1: Line 1:
Solid State Drives pose a variety of interesting challenges for computer forensics. Most SSD devices are based on flash memory. Flash has two properties that complicate its use in computer storage systems:
 
# Unlike normal hard drives that can be written in a single pass, flash memory is arranged in pages that must first be erased before it can be written.
 
# Each flash page consists of multiple blocks. Typically block size is 512 bytes and page size is 2KiB, 4KiB, or larger.
 
# Each page can be erased and rewritten a limited number of times---typically 1000 to 10,000. (Hard drive sectors, in contrast, can be rewritten millions of times or more.)
 
  
To overcome these problems, SSD manufacturers have created a system for ''wear leveling''---that is, spreading the writes to flash out among different sectors. Wear leveling is typically done with a ''flash translation layer'' that maps ''logical sectors'' (or LBAs) to ''physical pages.''  Most FTLs are contained within the SSD device and are not accessible to end users.
 
 
==Bibliography==
 
<bibtex>
 
@inproceedings{wei2011,
 
  author = {Michael Wei and Laura M. Grupp and Frederick M. Spada and Steven Swanson},
 
  title = {Reliably Erasing Data from Flash-Based Solid State Drives},
 
  booktitle={FAST 2011},
 
  year = 2011,
 
  keywords = {erasing flash security ssd},
 
  added-at = {2011-02-22T09:22:03.000+0100},
 
  url={http://cseweb.ucsd.edu/users/m3wei/assets/pdf/FMS-2010-Secure-Erase.pdf},
 
  biburl = {http://www.bibsonomy.org/bibtex/27c408ad559fc19f829717f485707a909/schmidt2}
 
}
 
</bibtex>
 
<bibtex>
 
@article{bell2011,
 
author="Graeme B. Bell and Richard Boddington",
 
title="Solid State Drives: The Beginning of the End for Current Practice in Digital Forensic Recovery?",
 
journal="Journal of Digital Forensics, Security and Law",
 
volume=5,
 
issue=3,
 
url={http://www.jdfsl.org/subscriptions/JDFSL-V5N3-Bell.pdf}
 
}
 
</bibtex>
 
==Presentations==
 
* [http://www.snia.org/events/storage-developer2009/presentations/thursday/NealChristiansen_ATA_TrimDeleteNotification_Windows7.pdf ATA Trim / Delete Notification Support in Windows 7], Neal Christiansen, Storage Developer 2009
 
* [http://www.slideshare.net/digitalassembly/challenges-of-ssd-forensic-analysis Challenges of SSD Forensic Analysis], Digital Assembly.
 
* Scott Moulton, Shmoocon 20008,  SSD drives vs. Hard Drives.
 
** [http://www.youtube.com/watch?v=l4hbdZFWGog SSD Flash Hard Drives - Shmoocon 2008 - Part 1]
 
** [http://www.youtube.com/watch?v=mglEnIPnzjo SSD Flash Hard Drives - Shmoocon 2008 - Part 2]
 
** [http://www.youtube.com/watch?v=3psy_d-pyNg SSD Flash Hard Drives - Shmoocon 2008 - Part 3]
 
** [http://www.youtube.com/watch?v=pKeZvhDd5c4 SSD Flash Hard Drives - Shmoocon 2008 - Part 4]
 
** [http://www.youtube.com/watch?v=9XMBdDypSO4 SSD Flash Hard Drives - Shmoocon 2008 - Part 5]
 
** [http://www.youtube.com/watch?v=LY36SWbfQg0 SSD Flash Hard Drives - Shmoocon 2008 - Part 6]
 
* [http://risky.biz/RB185 Risky Business #185], Peter Gutmann talks SSD forensics, March 4, 2011 (Radio Show)
 

Latest revision as of 22:43, 18 March 2013