首页 | 本学科首页   官方微博 | 高级检索  
     检索      


Descrambling data on solid-state disks by reverse-engineering the firmware
Institution:1. Temasek Laboratories @ NTU, Nanyang Technological University, Singapore 637553;2. Le2i, UMR CNRS 6306, Université de Bourgogne, 9 Avenue Alain Savary, 21000 Dijon, France;3. Centre National d''Etudes Spatiales (CNES), 18 Avenue Edouard Belin, 31401 Toulouse, France
Abstract:Data recovery is an important component of digital forensic research. Although recovering data from hard drives or small-scale mobile devices has been well studied, solid-state disks (SSDs) have a very different internal architecture and some additional functions, and it is not clear whether these differences will have an effect on data recovery. Data scrambling is an additional function of an SSD controller which can improve data reliability, but makes data recovery difficult. In this research, the dedicated flash software was first introduced that can acquire the physical image of an SSD without destroying the device hardware. Based on the software, a validation experiment was presented to evaluate the effect of data scrambling on data recovery and the causes of the effect were analyzed. Then two approaches to descrambling the data in the flash chips were proposed and their advantages and disadvantages discussed. After that, a procedure to identify the scrambling seeds that are used to descramble the scrambled data was described. Finally, descrambling software was implemented based on the second descrambling method. The experiment shows that this software can successfully descramble the data from an SSD flash drive regardless of the internal structure of the scrambler in the SSD controller and can generate an unscrambled physical image on which most existing data-recovery techniques can be effective.
Keywords:Solid-state disks  Digital forensics  Data scrambling  Physical image  Data recovery
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号