Forensic Issues and Techniques to Improve Security in SSD With Flex Capacity Feature
- Authors
- Ahn, Na Young; Lee, Dong Hoon
- Issue Date
- 2021
- Publisher
- IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
- Keywords
- Databases; Flash memories; Flexible printed circuits; Forensic; Forensics; Micrometers; NAND flash memory; Performance evaluation; SSD; Security; attack model; hidden area; invalid block; malware; over-provisioning
- Citation
- IEEE ACCESS, v.9, pp.167067 - 167075
- Indexed
- SCIE
SCOPUS
- Journal Title
- IEEE ACCESS
- Volume
- 9
- Start Page
- 167067
- End Page
- 167075
- URI
- https://scholar.korea.ac.kr/handle/2021.sw.korea/138711
- DOI
- 10.1109/ACCESS.2021.3136483
- ISSN
- 2169-3536
- Abstract
- Over-provisioning technology is typically introduced as a means to improve the performance of storage systems, such as databases. The over-provisioning area is both hidden and difficult for normal users to access. This paper focuses on attack models for such hidden areas. Malicious hackers use advanced over-provisioning techniques that vary capacity according to workload, and as such, our focus is on attack models that use variable over-provisioning technology. According to these attack models, it is possible to scan for invalid blocks containing original data or malware code that is hidden in the over-provisioning area. In this paper, we outline the different forensic processes performed for each memory cell type of the over-provisioning area and disclose security enhancement techniques that increase immunity to these attack models. This leads to a discussion of forensic possibilities and countermeasures for SSDs that can change the over-provisioning area. We also present information-hiding attacks and information-exposing attacks on the invalidation area of the SSD. Our research provides a good foundation upon which the performance and security of SSD-based databases can be further improved.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - School of Cyber Security > Department of Information Security > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.