2019 IEEE Symposium on Security and Privacy (SP) 2019
DOI: 10.1109/sp.2019.00088
|View full text |Cite
|
Sign up to set email alerts
|

Self-Encrypting Deception: Weaknesses in the Encryption of Solid State Drives

Abstract: We have analyzed the hardware full-disk encryption of several solid state drives (SSDs) by reverse engineering their firmware. These drives were produced by three manufacturers between 2014 and 2018, and are both internal models using the SATA and NVMe interfaces (in a M.2 or 2.5" traditional form factor) and external models using the USB interface.In theory, the security guarantees offered by hardware encryption are similar to or better than software implementations. In reality, we found that many models usin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(16 citation statements)
references
References 5 publications
0
15
0
1
Order By: Relevance
“…Another natural follow-on would be an investigation of modified firmware. This could include manufacturer provided firmware versions that have been altered using the findings of [4] or malware versions found in the ''wild. ''…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Another natural follow-on would be an investigation of modified firmware. This could include manufacturer provided firmware versions that have been altered using the findings of [4] or malware versions found in the ''wild. ''…”
Section: Discussionmentioning
confidence: 99%
“…Representative of the former, Bogaard and Bruijn demonstrated the feasibility of inserting a functioning backdoor into open-source SSD firmware [11] but recognized that this would be significantly more difficult on proprietary firmware where access was restricted by the manufacturer. This latter challenge has recently been overcome by Meijer and Gastel who demonstrated the ability to compromise proprietary, closed-source firmware on both Crucial and Samsung SSDs using techniques that included physical access and code injection [4]. In other related work, the firmware of SSDs has also been modified to detect and recover from ransomware attacks [12].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…We assume all hardware (e.g., the CPU/chipset and the storage device), microcode/firmware and other architecture-shipped modules (e.g., TXT's SINIT, see Section II) are properly implemented by the manufactures, and the user is motivated to choose a system with no known flaws. An example of such a flaw is a series of recently identified implementation bugs [43] in SED firmware implementations that highly affect data secrecy (refer to Section VI for details). 6) Attacks requiring physical access are excluded (e.g., no evil-maid attacks).…”
Section: )mentioning
confidence: 99%
“…Furthermore, in 2019, researchers Meijer and van Gastel [15] analysed hardware full-disk encryption of several solidstate drives (SSDs) produced by three manufacturers between 2014 and 2018 using internal SATA and NVMe interfaces or external USB interface. e analysis was done by RE (reverse engineering) the firmware of those devices.…”
Section: Introductionmentioning
confidence: 99%