Data Remanence: Secure Deletion of Data in Ssds

Total Page:16

File Type:pdf, Size:1020Kb

Data Remanence: Secure Deletion of Data in Ssds Master Thesis Computer Security Thesis no: MCS-2009:3 February 2009 Data Remanence: Secure Deletion of Data in SSDs Omar Al Homaidi School of Computing Blekinge Institute of Technology Soft Center SE – 37225 RONNEBY Sweden 1 This thesis is submitted to the Department of Interaction and System Design, School of Engineering at Blekinge Institute of Technology in partial fulfillment of the requirements for the degree of Master of Science in Computer Science. The thesis is equivalent to 20 weeks of full time studies. Contact Information: Author: Omar Al Homaidi Address: Minervavägen 22B, 371 41 Karlskrona – Sweden Email: [email protected] University Advisor: Martin Boldt Department of Computing External Advisors: Fredrik Forslund, Daniel Öberg SafeIT Security AB Address: Engelbrektsgatan 7, SE- 114 32 Stockholm – Sweden Phone: +46 8 665 79 59 Department of Computing Internet : www.bth.se/tek Blekinge Institute of Technology Phone : + 46 457 38 50 00 Soft Center Fax : + 46 457 102 45 SE – 372 25 RONNEBY Sweden 2 ABSTRACT The ongoing fast pace research in hardware and software technology has resulted in memory devices efficient and faster than ever before. However, the issue of security of the contained data is rarely discussed. There is an evident capability of these devices to retain data even when it is erased. In this thesis, a study is conducted to qualitatively analyze the extent to which data deletion is important and why secure deletion should be applied. Afterwards, following the sequential exploratory procedure, this paper presents an analysis of methods used to recover the data after being deleted in addition to the techniques used to securely delete this data. Based on this study, some recommendations are made to ensure the safety of data. Keywords: SSD, Secure Erase, Flash, Data Retention, ATA, TRIM. 3 ACKNOWLEDGEMENTS I would like to heartily acknowledge my advisor Martin Boldt for continuous encouragement during the time of writing this thesis. His guidance, professional style and valuable comments and recommendations helped me to accomplish this thesis on time. To Fredrik Forslund and Daniel Öberg, who took the time and effort to support me throughout my thesis. To my family, who gave me invaluable support over the years. Your encouragement is greatly appreciated. A special thanks to my friends who supported me during writing the thesis as well as reviewing and discussing some issues. 4 CONTENTS ABSTRACT ...................................................................................................................................................... 3 ACKNOWLEDGEMENTS .............................................................................................................................. 4 CONTENTS ..................................................................................................................................................... 5 LIST OF FIGURES .......................................................................................................................................... 8 LIST OF TABLES ............................................................................................................................................ 9 INTRODUCTION ........................................................................................................................................... 10 CHAPTER 1: BACKGROUND ....................................................................................................................... 11 1.1 NOR-BASED NAND-BASED FLASH TECHNOLOGIES ................................................................................... 11 1.2 NAND FLASH BASICS ................................................................................................................................ 12 1.3 NAND FLASH CHALLENGES ....................................................................................................................... 13 1.3.1 Wear-Leveling ........................................................................................................................................ 13 1.3.2 Error Correction .................................................................................................................................... 13 1.3.3 Bad Block Management ......................................................................................................................... 13 1.3.4 Garbage Collection ............................................................................................................................... 14 1.4 SSDS .......................................................................................................................................................... 14 1.4.1 HDD Architecture and Operation ......................................................................................................... 14 1.4.2 SSD Architecture and Operation ........................................................................................................... 15 1.4.3 SSD vs. HDD ......................................................................................................................................... 16 CHAPTER 2: PROBLEM DEFINITION/GOALS .......................................................................................... 18 2.1 GOALS ........................................................................................................................................................ 18 2.2 LIMITATIONS ............................................................................................................................................... 18 CHAPTER 3: METHODOLOGY ................................................................................................................... 20 3.1 RESEARCH QUESTIONS ............................................................................................................................... 21 3.1.1 RQ1: How does SSDs retain data after deletion? .................................................................................. 21 3.1.2 RQ2: What are the security risks of data retention in SSDs? ................................................................ 21 3.1.3 RQ3: What are the existing techniques to “Security Erase” data from SSDs? ..................................... 21 3.1.4 RQ4: How could SSDs be completely erased from sensitive data? ....................................................... 21 3.2 METHODOLOGY SUMMERY ......................................................................................................................... 21 3.3 INFORMATION COLLECTION ........................................................................................................................ 22 3.4 INFORMATION ANALYSIS ............................................................................................................................ 22 3.5 CASE STUDY ............................................................................................................................................... 22 3.6 EXPERIMENTS ............................................................................................................................................. 22 3.6.1 Variable Selection .................................................................................................................................. 23 3.6.2 Experiment Design ................................................................................................................................. 23 3.6.3 Result Analysis ....................................................................................................................................... 23 CHAPTER 4: THEORETICAL WORK ......................................................................................................... 24 5 4.1 DATA REMANENCE IN SSDS ....................................................................................................................... 24 4.1.1 System-Level Remanence ....................................................................................................................... 24 4.1.2 Machine-Level Remanence .................................................................................................................... 24 4.1.3 Data Remanence Consequences ............................................................................................................ 25 4.2.1 Time ....................................................................................................................................................... 25 4.2.2 Constantly Flipping the Bits .................................................................................................................. 25 4.2.3 Software Solution ................................................................................................................................... 26 4.2.4 Encryption ............................................................................................................................................. 26 4.2.5 Media Destruction ................................................................................................................................. 26 4.2.6 TRIM command ..................................................................................................................................... 27 4.3 ATA STANDARD: SECURITY ERASE ............................................................................................................ 27 4.3.1 SanDisk SSD serial
Recommended publications
  • Blancco Erasure Software Manual
    BLANCCO ERASURE SOFTWARE User manual for x86 erasure client version 4.9 30.3.2009 TABLE OF CONTENTS 1. GLOSSARY .......................................................................................................4 2. GENERAL INFORMATION.................................................................................5 Minimum System Requirements .......................................................................................................5 Booting and Computer Settings .......................................................................................................5 3. BLANCCO ERASURE SOFTWARE ......................................................................6 3.1. Function keys .......................................................................................................................... 8 [F2] Change language / Keyboard layout..........................................................................................8 [F3] Select overwriting method / options ..........................................................................................8 [F4] HexViewer ..............................................................................................................................9 [F5] Reports, Load previous reports / Check report integrity...............................................................9 [F6] Option to run additional SMART tests ........................................................................................9 [F7] Bad disk option [Displayed only when the computer has SCSI
    [Show full text]
  • Blancco LUN Eraser for Windows User Manual for Version 2.1
    Blancco LUN Eraser for Windows User manual for Version 2.1 www.blancco.com Abstract This is the official Blancco LUN Eraser for Windows User Manual. Blancco is the proven data erasure solution for millions of users around the world. As the pioneer and global leader in data sanitization and end- of-lifecycle solutions, the company offers the most certified data erasure within the industry. Blancco LUN Eraser allows data storage administrators to securely erase individual drives, as well as logical drives (such as LUNs), in an active storage environment. 2 Blancco LUN Eraser User Manual Definitions Item Explanation To execute some actions on a computer administrator rights may be required. This means that Administrator rights only the person with permission and unrestricted access, or the administrator, has the rights to implement said act. The line on the display screen where a command is expected. Generally, the command line is Command line the line that contains the most recently displayed command prompt. A console based program uses a text based interface. Many console applications are Console command line tools. Diskpart Diskpart is a command line utility that supports the use of scripts to automate its procedure. DWORD is one of the terms used to describe a variety of sizes of data. A DWORD consists of DWORD two WORDs which is equal to 32 bits. HASP key HASP key is inserted in a USB port and contains the Blancco licensing data. HTML, which stands for Hyper Text Markup Language, is the predominant markup language for web pages. It provides a possibility to create structured documents by denoting structural HTML semantics for text such as headings, paragraphs, lists etc.
    [Show full text]
  • The 2006 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market
    Journal of Digital Forensics, Security and Law Volume 1 Number 3 Article 2 2006 The 2006 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market Andy Jones Security Research Center, British Telecommunicationsand Edith Cowan University Craig Valli Edith Cowan University Iain Sutherland University of Glamorgan Paula Thomas University of Glamorgan Follow this and additional works at: https://commons.erau.edu/jdfsl Part of the Computer Engineering Commons, Computer Law Commons, Electrical and Computer Engineering Commons, Forensic Science and Technology Commons, and the Information Security Commons Recommended Citation Jones, Andy; Valli, Craig; Sutherland, Iain; and Thomas, Paula (2006) "The 2006 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market," Journal of Digital Forensics, Security and Law: Vol. 1 : No. 3 , Article 2. DOI: https://doi.org/10.15394/jdfsl.2006.1008 Available at: https://commons.erau.edu/jdfsl/vol1/iss3/2 This Article is brought to you for free and open access by the Journals at Scholarly Commons. It has been accepted for inclusion in Journal of Digital Forensics, Security and Law by an authorized administrator of (c)ADFSL Scholarly Commons. For more information, please contact [email protected]. Journal of Digital Forensics, Security and Law, Vol. 1(3) The 2006 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market Andy Jones Security Research Center, British Telecommunications and Edith Cowan University [email protected] Phone: +44 1473 646133 Fax: +44 1473 644385 Craig Valli Edith Cowan University Iain Sutherland University of Glamorgan Paula Thomas University of Glamorgan ABSTRACT All organisations, whether in the public or private sector, use computers for the storage and processing of information relating to their business or services, their employees and their customers.
    [Show full text]
  • How Blancco Helps Mobile Resellers & Recyclers Achieve Compliance
    How Blancco Helps Mobile Resellers & Recyclers Achieve Compliance with the R2 Standard Mobile resellers and recyclers must comply with several standards and certifications before reselling, remarketing or recycling their devices. Following these rules helps mobile organizations ensure that they are protected from potential data remanence that could expose sensitive information. One of the most prominent certifications is called R2. The latest version of the Standard is the R2:2013. Each provision of the R2 Standard is designed to help ensure the transparency, quality, social and environmental responsibility of R2 Certified electronics facilities such as mobile resellers and recyclers. R2:2013 was developed through a transparent multi-stakeholder process, consistent with ANSI essential requirements. R2 undergoes consistent review to advance the requirements in-line with the needs of the industry. Blancco Mobile Diagnostics & Erasure solutions supply mobile resellers around the globe a certified process so that they can meet (and even exceed) the R2 standard for device testing and data sanitization. Blancco solutions exceed the requirements presented in the Standard, with verification and certification of each data erasure. This ensures that data does not remain on mobile devices following processing and prior to moving into the secondary market via reverse/forward logistics. Section of the Standard How Blancco Helps 1. Tested and Full Functions, R2/Ready for Reuse Blancco Mobile Solutions enables mobile resellers and retailers to (A) “Use effective test methods to confirm that all functions quickly and accurately find the source of mobile device issues and for equipment and components are working properly resolve them. and ready for reuse, including properly configured with appropriate legally licensed software where required for operation of equipment and components, and device specific drivers within the product’s hardware…” 2.
    [Show full text]
  • Data Remanence in Flash Memory Devices
    Data Remanence in Flash Memory Devices Sergei Skorobogatov University of Cambridge, Computer Laboratory, 15 JJ Thomson Avenue, Cambridge CB3 0FD, United Kingdom [email protected] Abstract. Data remanence is the residual physical representation of data that has been erased or overwritten. In non-volatile programmable devices, such as UV EPROM, EEPROM or Flash, bits are stored as charge in the floating gate of a transistor. After each erase operation, some of this charge remains. Security protection in microcontrollers and smartcards with EEPROM/Flash memories is based on the assumption that information from the memory disappears completely after erasing. While microcontroller manufacturers successfully hardened already their designs against a range of attacks, they still have a common problem with data remanence in floating-gate transistors. Even after an erase operation, the transistor does not return fully to its initial state, thereby allowing the attacker to distinguish between previously programmed and not programmed transistors, and thus restore information from erased memory. The research in this direction is summarised here and it is shown how much information can be extracted from some microcontrollers after their memory has been ‘erased’. 1 Introduction Data remanence as a problem was first discovered in magnetic media [1,2]. Even if the information is overwritten several times on disks and tapes, it can still be possible to extract the initial data. This led to the development of special methods for reliably removing confidential information from magnetic media. Semiconductor memory in security modules was found to have similar prob- lems with reliable data deletion [3,4]. Data remanence affects not only SRAM, but also memory types like DRAM, UV EPROM, EEPROM and Flash [5].
    [Show full text]
  • Cold Boot Attacks on Encryption Keys
    Lest We Remember: Cold Boot Attacks on Encryption Keys † ‡ J. Alex Halderman∗, Seth D. Schoen , Nadia Heninger∗, William Clarkson∗, William Paul , Joseph A. Calandrino∗, Ariel J. Feldman∗, Jacob Appelbaum, and Edward W. Felten∗ † ‡ ∗ Princeton University Electronic Frontier Foundation Wind River Systems jhalderm, nadiah, wclarkso, jcalandr, ajfeldma, felten @cs.princeton.edu { } [email protected], [email protected], [email protected] Abstract memory. They pose a particular threat to laptop users who rely on disk encryption products, since an adversary who Contrary to popular assumption, DRAMs used in most steals a laptop while an encrypted disk is mounted could modern computers retain their contents for several sec- employ our attacks to access the contents, even if the com- onds after power is lost, even at room temperature and puter is screen-locked or suspended. We demonstrate this even if removed from a motherboard. Although DRAMs risk by defeating several popular disk encryption systems, become less reliable when they are not refreshed, they including BitLocker, TrueCrypt, and FileVault, and we are not immediately erased, and their contents persist expect many similar products are also vulnerable. sufficiently for malicious (or forensic) acquisition of us- able full-system memory images. We show that this phe- While our principal focus is disk encryption, any sen- nomenon limits the ability of an operating system to pro- sitive data present in memory when an attacker gains tect cryptographic key material from an attacker with physical access to the system could be subject to attack. physical access. We use cold reboots to mount successful Many other security systems are probably vulnerable.
    [Show full text]
  • Practical Cyber Forensics an Incident-Based Approach to Forensic Investigations
    Practical Cyber Forensics An Incident-Based Approach to Forensic Investigations Niranjan Reddy Practical Cyber Forensics Niranjan Reddy Pune, Maharashtra, India ISBN-13 (pbk): 978-1-4842-4459-3 ISBN-13 (electronic): 978-1-4842-4460-9 https://doi.org/10.1007/978-1-4842-4460-9 Copyright © 2019 by Niranjan Reddy This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Trademarked names, logos, and images may appear in this book. Rather than use a trademark symbol with every occurrence of a trademarked name, logo, or image we use the names, logos, and images only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein.
    [Show full text]
  • Blancco Drive Eraser Certified and Patented Data Erasure Software for Hdds and Ssds on Pcs, Laptops, Servers and Storage Environments
    Blancco Drive Eraser Certified and Patented Data Erasure Software for HDDs and SSDs on PCs, Laptops, Servers and Storage Environments. Blancco Drive Eraser is a robust data wiping solution for Why Blancco any PCs, laptops, servers and storage environments. The pressure on organizations to build and maintain robust security policies As the de facto standard and safeguard their sensitive data is ever-increasing. With Blancco Drive Eraser, organizations can reduce the risk of costly security breaches by in data erasure, Blancco permanently erasing sensitive data from HDDs and complex SSDs in desktop/ provides thousands of laptop computers and servers. Through our patented SSD erasure process*, there is now a secure method to wipe data on storage devices - regardless of organizations with an absolute underlying technology - to safely resell, repurpose or dispose of drives. line of defense against costly security breaches, as well Key Benefits as verification of regulatory Revolutionary, Patented SSD Erasure Method compliance through a 100% tamper-proof audit trail. • Take advantage of the first solution on the market that has the patented capability to verifiably erase SSDs Our data erasure solutions have been tested, certified, • Ensure a full overwrite with our solution that has been verified through independent testing and acknowledge by DIPCOG for suitable erasure approved and recommended of SSD media by 18 governing bodies around Flexible Deployments to Meet Your Specific Requirements the world. No other security firm can boast this level of • Fully automate the erasure process or maintain manual control compliance with the most • Deploy as an MSI package and pre-installed on a machine rigorous requirements set by Maximize IT Security Compliance government agencies, legal authorities and independent • Guarantee 100% secure erasure and provide a complete audit trail with our comprehensive digitally-signed, post-erasure certificates testing laboratories.
    [Show full text]
  • Guidelines for Media Sanitization
    NIST Special Publication 800-88 Revision 1 Guidelines for Media Sanitization Richard Kissel Andrew Regenscheid Matthew Scholl Kevin Stine This publication is available free of charge from: http://dx.doi.org/10.6028/NIST.SP.800-88r1 C O M P U T E R S E C U R I T Y NIST Special Publication 800-88 Revision 1 Guidelines for Media Sanitization Richard Kissel Andrew Regenscheid Matthew Scholl Kevin Stine Computer Security Division Information Technology Laboratory This publication is available free of charge from: http://dx.doi.org/10.6028/NIST.SP.800-88r1 December 2014 U.S. Department of Commerce Penny Pritzker, Secretary National Institute of Standards and Technology Willie May, Acting Under Secretary of Commerce for Standards and Technology and Acting Director Authority This publication has been developed by NIST in accordance with its statutory responsibilities under the Federal Information Security Management Act of 2002 (FISMA), 44 U.S.C. § 3541 et seq., Public Law 107-347. NIST is responsible for developing information security standards and guidelines, including minimum requirements for Federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate Federal officials exercising policy authority over such systems. This guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130, Section 8b(3), Securing Agency Information Systems, as analyzed in Circular A-130, Appendix IV: Analysis of Key Sections. Supplemental information is provided in Circular A-130, Appendix III, Security of Federal Automated Information Resources. Nothing in this publication should be taken to contradict the standards and guidelines made mandatory and binding on Federal agencies by the Secretary of Commerce under statutory authority.
    [Show full text]
  • Analysing Android's Full Disk Encryption Feature
    Analysing Android’s Full Disk Encryption Feature Johannes Gotzfried¨ ∗ and Tilo Muller¨ Friedrich-Alexander-Universitat¨ Erlangen-Nurnberg,¨ Germany fjohannes.goetzfried, [email protected] Abstract Since Android 4.0, which was released in October 2011, users of Android smartphones are pro- vided with a built-in encryption feature to protect their home partitions. In the work at hand, we give a structured analysis of this software-based encryption solution. For example, software-based encryption always requires at least a small part of the disk to remain unencrypted; in Android this is the entire system partition. Unencrypted parts of a disk can be read out and are open to system manipulations. We present a tool named EvilDroid to show that with physical access to an encrypted smartphone only (i.e., without user level privileges), the Android system partition can be subverted with keylogging. Additionally, as it was exemplary shown by attacks against Galaxy Nexus devices in 2012, Android-driven ARM devices are vulnerable to cold boot attacks. Data recovery tools like FROST exploit the remanence effect of RAM to recover data from encrypted smartphones, at worst the disk encryption key. With a Linux kernel module named Armored, we demonstrate that Android’s software encryption can be improved to withstand cold boot attacks by performing AES entirely on the CPU without RAM. As a consequence, cold boot attacks on encryption keys can be defeated. We present both a detailed security and a performance analysis of Armored. Keywords: cold boot, evil maid, Android, cpu-bound encryption 1 Introduction Smartphones are long since part of the privacy sphere of their owners, and consequently, a missing smartphone that falls into the wrong hands has severe consequences for its owner.
    [Show full text]
  • An Overview of DRAM-Based Security Primitives
    cryptography Article An Overview of DRAM-Based Security Primitives Nikolaos Athanasios Anagnostopoulos 1 ID , Stefan Katzenbeisser 1, John Chandy 2 ID and Fatemeh Tehranipoor 3,∗ ID 1 Computer Science Department, Technical University of Darmstadt, Mornewegstraße 32, S4|14, 64293 Darmstadt, Germany; [email protected] (N.A.A.); [email protected] (S.K.) 2 Department of Electrical and Computer Engineering, University of Connecticut, 371 Fairfield Way, U-4157, Storrs, CT 06269-4157, USA; [email protected] 3 School of Engineering, San Francisco State University, 1600 Holloway Avenue, San Francisco, CA 94132, USA * Correspondence: [email protected]; Tel.: +1-415-338-7821 Received: 25 February 2018; Accepted: 26 March 2018; Published: 28 March 2018 Abstract: Recent developments have increased the demand for adequate security solutions, based on primitives that cannot be easily manipulated or altered, such as hardware-based primitives. Security primitives based on Dynamic Random Access Memory (DRAM) can provide cost-efficient and practical security solutions, especially for resource-constrained devices, such as hardware used in the Internet of Things (IoT), as DRAMs are an intrinsic part of most contemporary computer systems. In this work, we present a comprehensive overview of the literature regarding DRAM-based security primitives and an extended classification of it, based on a number of different criteria. In particular, first, we demonstrate the way in which DRAMs work and present the characteristics being exploited for the implementation of security primitives. Then, we introduce the primitives that can be implemented using DRAM, namely Physical Unclonable Functions (PUFs) and True Random Number Generators (TRNGs), and present the applications of each of the two types of DRAM-based security primitives.
    [Show full text]
  • Encrypted Disk Unmount Using Personalized Audio Instruction
    Masaryk University Faculty of Informatics Encrypted disk unmount using personalized audio instruction Bachelor’s Thesis Matúš Jarkovič Brno, Fall 2019 Replace this page with a copy of the official signed thesis assignment anda copy of the Statement of an Author. Declaration Hereby I declare that this paper is my original authorial work, which I have worked out on my own. All sources, references, and literature used or excerpted during elaboration of this work are properly cited and listed in complete reference to the due source. Matúš Jarkovič Advisor: RNDr. Dušan Klinec i Acknowledgements Firstly, I would like to express my deepest appreciation to my su- pervisor, RNDr. Dušan Klinec, for all of the suggestions, advice and guidance he provided me throughout the implementation and thesis creation. Secondly, I would like to thank my family that supported me dur- ing the studies. They have provided a very pleasant environment and the thesis would not be possible without them. Lastly, but most importantly I would like to express sincere gratitude to my beloved girlfriend who took care of me at all times. iii Abstract This thesis provides a brief overview of the most popular free open source storage encryption solutions as well as keyword spotting (KWS) systems. It mainly focuses on a basic functionality and highlights main features of these programs. Furthermore, a description of the most used types of storage encryption technologies is included. The goal of the practical part is to extend a disk encryption software VeraCrypt with a KWS system. For this task a tool named Mycroft Precise is used.
    [Show full text]