ForensicsWiki will continue to operate as it has before and will not be shutting down. Thank you for your continued support of ForensicsWiki.
Difference between revisions of "Solid State Drive (SSD) Forensics"
(→Bibliography: added recent article on SSD forensics.)
|Line 17:||Line 17:|
Revision as of 13:59, 28 March 2013
Solid State Drives pose a variety of interesting challenges for computer forensics in comparison with traditional rotating magnetic platter hard drives.
Most SSD devices are based on flash memory; some have battery backed SRAM or DRAM with a flash backing store.
Flash has a number of key properties that complicate its use in computer storage systems and subsequent forensic analysis:
- Internally, flash memory is not divided into the traditional 512 byte blocks, but instead is in pages of 2KiB, 4KiB, or larger, although it is still presented to the host computer in blocks
- Whilst hard drives can be written in a single pass, flash memory pages must be erased (in whole) before they can be rewritten.
- Rewriting a block at the operating system level does not necessarily rewrite the same page in the flash memory due to the controller remapping data to spread wear or avoid failing pages
- Each page can be erased and rewritten a limited number of times – typically 1000 to 10,000. (Hard drive sectors, in contrast, can be rewritten millions of times or more.)
- Flash data is often encrypted on the drive, and can be "erased" by telling the controller to forget the old key and generate a new one, as well as marking all blocks as unused
The controller in a flash SSD is significantly more complex in the number of tasks it has to perform in comparison to a magnetic rotating drive, with the following features:
- wear leveling – that is, spreading the writes to flash out among different sectors. Wear leveling is typically done with a flash translation layer that maps logical sectors (or LBAs) to physical pages. Most FTLs are contained within the SSD device and are not accessible to end users.
- read/modify/relocate+write - if the controller allows rewriting of a partial flash page, it must read the entire page, modify the sector that is being written, and write the new flash page in a new/fresh location which has been previously erased. the old pre-modification data's page is then queued for erase.
Yuri Gubanov, Oleg Afonin - Why SSD Drives Destroy Court Evidence, and What Can Be Done About It
- Article ,2012
BibtexAuthor : Yuri Gubanov, Oleg Afonin
Title : Why SSD Drives Destroy Court Evidence, and What Can Be Done About It
In : Article -
Date : 2012
Michael Wei, Laura M. Grupp, Frederick M. Spada, Steven Swanson - Reliably Erasing Data from Flash-Based Solid State Drives
- FAST 2011 ,2011
BibtexAuthor : Michael Wei, Laura M. Grupp, Frederick M. Spada, Steven Swanson
Title : Reliably Erasing Data from Flash-Based Solid State Drives
In : FAST 2011 -
Date : 2011
Graeme B. Bell, Richard Boddington - Solid State Drives: The Beginning of the End for Current Practice in Digital Forensic Recovery?
- Journal of Digital Forensics, Security and Law 5,2011
BibtexAuthor : Graeme B. Bell, Richard Boddington
Title : Solid State Drives: The Beginning of the End for Current Practice in Digital Forensic Recovery?
In : Journal of Digital Forensics, Security and Law -
Date : 2011
Billard, David, Hauri, Rolf - Making sense of unstructured flash-memory dumps
- Proceedings of the 2010 ACM Symposium on Applied Computing pp. 1579--1583, New York, NY, USA,2010
BibtexAuthor : Billard, David, Hauri, Rolf
Title : Making sense of unstructured flash-memory dumps
In : Proceedings of the 2010 ACM Symposium on Applied Computing -
Address : New York, NY, USA
Date : 2010
James E. Regan - The Forensic Potential of Flash Memory
- Master's Thesis, Naval Postgraduate School , Monterey, CA,2009
BibtexAuthor : James E. Regan
Title : The Forensic Potential of Flash Memory
In : Master's Thesis, Naval Postgraduate School -
Address : Monterey, CA
Date : 2009
Phillips, B. J., Schmidt, C. D., Kelly, D. R. - Recovering data from USB flash memory sticks that have been damaged or electronically erased
- Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop pp. 19:1--19:6, ICST, Brussels, Belgium, Belgium,2008
BibtexAuthor : Phillips, B. J., Schmidt, C. D., Kelly, D. R.
Title : Recovering data from USB flash memory sticks that have been damaged or electronically erased
In : Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop -
Address : ICST, Brussels, Belgium, Belgium
Date : 2008
- Milan Broz's blog - TRIM & dm-crypt ... problems?
- ATA Trim / Delete Notification Support in Windows 7, Neal Christiansen, Storage Developer 2009
- Challenges of SSD Forensic Analysis, Digital Assembly,
- Solid State Drives: Ruining Forensics, by Scott Moulton, DEFCON 16 (2008)
- Scott Moulton, Shmoocon 20008, SSD drives vs. Hard Drives.
- Risky Business #185, Peter Gutmann talks SSD forensics, March 4, 2011 (Radio Show)