Inferring File System of Solid State Drives Based on Current Consumption

Total Page:16

File Type:pdf, Size:1020Kb

Inferring File System of Solid State Drives Based on Current Consumption The 7th Annual IEEE International Conference on Cyber Technology in Automation, Control and Intelligent Systems July 31-August 4, 2017, Hawaii, USA Inferring File System of Solid State Drives based on Current Consumption Jacob Melton, Ryan Rakvic, James Shey, Hau Ngo, Kevin D. Fairbanks Owens Walker, Justin Blanco, Dane Brown, Luke [email protected] McDowell Electrical and Computer Engineering Department United States Naval Academy Annapolis, MD, US. Abstract—With the increasing demand for faster reliable When using a secondary storage device such as an SSD, a secondary storage, Solid State Drives (SSDs) have provided a file system is used to organize data in memory. A file system viable replacement for Hard Disk Drives (HDDs). SSDs contain provides a method to organize physical data locations so that NAND flash memory components and a processor that executes firmware at the device level to optimize performance. The on- the operating system can keep track of and access the data. board processor and firmware handle operations such as garbage Some file systems such as NTFS provide additional functions collection and encryption with no visibility to the user. Therefore, such as fault tolerance which provides an additional record of classifying SSD internal behavior can help identify compromised file locations in case of unforeseen errors [4]. This extra fault devices. This paper utilizes high precision measurements of tolerance is a result of using a file system’s journaling to track power used by an SSD via an oscilloscope, to infer a drive’s file what data and metadata have not been fully committed. In the system format. We consider four file systems (NTFS, exFAT, FAT32 and EXT4) and demonstrate that frequency analysis of event of a system crash, the journal allows the drive to more power consumption can identify the system in use. In particular, quickly return to a consistent state. This paper investigates the we show that transforming the frequency-domain power file systems NTFS, exFAT, FAT32 and EXT4. EXT4 and signature with principal components analysis can produce a NTFS are journaling file systems while exFAT and FAT32 are small number of highly predictive features. Using a k-NN not. All of these file systems are commonly used in modern classifier, we then demonstrate that these features enable an computing systems. SSD’s power signature to identify the correct file system 94.3 The main contribution of this paper is a measurement and percent accuracy on a Samsung SSD and with 96.5 percent accuracy on a Crucial SSD. analysis technique for inferring file system type by observing the current consumption of the measured device. Knowing the file system used on a drive can help identify what Operating I. INTRODUCTION System (OS) is being used with the SSD. Since OSs have A Solid State Drive (SSD) operates and stores data in a default file systems, a method to determine the file system on fundamentally different way from a Hard Disk Drive (HDD). a device can give information about the OS. It is important for SSD’s utilize a NAND-based flash memory, which has no computer forensics investigators to know the OS being used moving magnetic components while HDD’s have rotating for a computer system. The OS controls how files are being disks. More specifically, NAND flash memory utilizes an accessed not only on the SSD but throughout the whole array of memory cells that are made up of floating gate system [7]. Additionally, being able to classify the file system transistors managed by the flash translation layer [1]. The an SSD is formatted to based on power consumption can be transistors are arranged in columns connected in series with used to identify malfunction or other abnormal behavior [5,6]. the source terminal of a given transistor connected to the drain For instance, a unique component of SSDs compared to HHDs terminal of the next transistor. Many of these columns are is the onboard controller. The user has no visibility to the placed together to form a memory block. Block sizes typically controller’s operations and therefore cannot determine if the can range from 256KB to 4MB and due to the arrangement of firmware being executed contains malicious operations. the flash memory, data has to be erased in blocks [2]. Since Devices can have malware or Trojan circuits that SSDs utilize NAND flash memory, they have lower access compromises the security and integrity of information stored times, higher data transfer rates, and use less power compared on the SSD. Therefore, it is important to develop techniques to to HDDs, which manipulate a magnetic film to record analyze SSD behavior to ensure the device is performing as information. A controller on the SSD serves as a bridge to the expected. In this work, we classify file systems using the host computer executes garbage collection, and performs current consumption signatures of read and write operations of TRIM operations [3]. varying size. U.S. Government work not protected by U.S. copyright 72 II. RELATED WORK Darmstadt, Germany) [14] as seen in Fig. 1(b). The data With their unique advantages, SSDs continue to gain recorder was triggered externally by a voltage pulse sent over popularity with consumers. In [3, 9, 10], the performance of a USB-to-Serial connection to synchronize the start and stop SSDs are analyzed in different situations and potential times of the data runs. improvements are proposed. For example, in [3] the TRIM 3) SSD: The target SSDs were a Samsung 850 Evo device operation’s performance is analyzed in the EXT4 [15] and with a size of 250GB and a Crucial MX200 desvice with a size NTFS file systems. The TRIM operation is shown to degrade of 250GB. The Samsung’s model was MZ-75E250 with a read performance of the SSD over time. speed of 425 MB/s and write speed of 386 MB/s. The Crucial’s In [11], the author uses a black box approach to analyze the model was CT500MX200SSD1, with a read speed of 555MB/s and a write speed of 500MB/s. performance of several different SSD models using a variety of workloads. Creating a model for SSD behavior is important for instances such as designing a storage system. The author of B. Data Collection and Analysis [12] explains how the unique components of SSDs such as the 1) Data Collection: the data collection process is controller contribute to an inability to recover data from drives semi- automated, with the manual step being the formatting of in a computer forensic situation. As SSDs get faster, more the drive with the desired file system of NTFS, exFAT, Fat32 aggressive firmware programs store and permanently delete or Ext4. Once, the file system is chosen, a Python script data in manners that affect recovery of information. creates files of a user-specified size ranging from 10MB to 1 The authors of [8] present a method for inferring TRIM GB comprised of random characters. Each of these different commands which can be seen as the foundation of work that sized text files is then written to or read from the SSD fifteen our team builds upon in this paper. These results show that times each while the current consumption of the device is power analysis techniques can be used to infer or gather more being recorded. These same random text files are used for information about the internal operations of SSDs. In [13], a testing with both SSDs with their varying file systems. A total similar energy consumption monitoring technique is used to of 1800 current data files were gathered for the testing of four identify read and write operations across different different file systems on an SSD. A minimum of two minutes manufactures. Read and write operations for different SSDs is waited between the end of an operation and the initiation of contain similar energy consumption characteristics. another to ensure that any residual processes on the SSD were III. EXPERIMENTAL DESIGN completed before the new operation. The end of an operation is determined when the host computer has finished writing or This section describes the experimental setup and the reading from the SSD. Two minutes was chosen because this software used for data collection and analysis. The apparatus amount of time ensures that there are no visually discernable was developed in a previous study [8] to monitor SSD power signs of activity on the host computer or in the voltage signal consumption. resulting from the operation on the SSD. Subsequently, the SSD was reformatted with a different file system and this data A. Hardware gathering process was repeated. In this section the physical components of the experiment are discussed. 1) Computer System: The computer used to program and interface with the SSD has an Intel Core i5-2400 processor with 8 GB DDR3 RAM. During the data collection phase, Windows 10 was running on the computer. The system had two drives mounted to it, the first was an ADATA SP600 SSD used to store the operating system and software required for the experiments and the second was the target SSD. The target SSD was mounted as a secondary drive to ensure that the resulting current signature was unrelated to the OS operations occurring during the experiment. 2) Taking Measurements from SSD: The measurements were gathered from a daughterboard where a 0.1 Ohm precision resistor was placed in series with the power supply Fig. 1. System Setup including (a) Daughterboard and (b) Data Recorder [8] to the SSD as seen is Fig. 1(a). By measuring the voltage (V) 2) Data Analysis: Since the data gathered by the Gen3i Data across a resistor (R) of known value, the current (I) supplied Recorder were voltage measurements, the data points were can be calculated through the equation V=IR.
Recommended publications
  • NTFS • Windows Reinstallation – Bypass ACL • Administrators Privilege – Bypass Ownership
    Windows Encrypting File System Motivation • Laptops are very integrated in enterprises… • Stolen/lost computers loaded with confidential/business data • Data Privacy Issues • Offline Access – Bypass NTFS • Windows reinstallation – Bypass ACL • Administrators privilege – Bypass Ownership www.winitor.com 01 March 2010 Windows Encrypting File System Mechanism • Principle • A random - unique - symmetric key encrypts the data • An asymmetric key encrypts the symmetric key used to encrypt the data • Combination of two algorithms • Use their strengths • Minimize their weaknesses • Results • Increased performance • Increased security Asymetric Symetric Data www.winitor.com 01 March 2010 Windows Encrypting File System Characteristics • Confortable • Applying encryption is just a matter of assigning a file attribute www.winitor.com 01 March 2010 Windows Encrypting File System Characteristics • Transparent • Integrated into the operating system • Transparent to (valid) users/applications Application Win32 Crypto Engine NTFS EFS &.[ßl}d.,*.c§4 $5%2=h#<.. www.winitor.com 01 March 2010 Windows Encrypting File System Characteristics • Flexible • Supported at different scopes • File, Directory, Drive (Vista?) • Files can be shared between any number of users • Files can be stored anywhere • local, remote, WebDav • Files can be offline • Secure • Encryption and Decryption occur in kernel mode • Keys are never paged • Usage of standardized cryptography services www.winitor.com 01 March 2010 Windows Encrypting File System Availibility • At the GUI, the availibility
    [Show full text]
  • Minimum Hardware and Operating System
    Hardware and OS Specifications File Stream Document Management Software – System Requirements for v4.5 NB: please read through carefully, as it contains 4 separate specifications for a Workstation PC, a Web PC, a Server and a Web Server. Further notes are at the foot of this document. If you are in any doubt as to which specification is applicable, please contact our Document Management Technical Support team – we will be pleased to help. www.filestreamsystems.co.uk T Support +44 (0) 118 989 3771 E Support [email protected] For an in-depth list of all our features and specifications, please visit: http://www.filestreamsystems.co.uk/document-management-specification.htm Workstation PC Processor (CPU) ⁴ Supported AMD/Intel x86 (32bit) or x64 (64bit) Compatible Minimum Intel Pentium IV single core 1.0 GHz Recommended Intel Core 2 Duo E8400 3.0 GHz or better Operating System ⁴ Supported Windows 8, Windows 8 Pro, Windows 8 Enterprise (32bit, 64bit) Windows 10 (32bit, 64bit) Memory (RAM) ⁵ Minimum 2.0 GB Recommended 4.0 GB Storage Space (Disk) Minimum 50 GB Recommended 100 GB Disk Format NTFS Format Recommended Graphics Card Minimum 128 MB DirectX 9 Compatible Recommended 128 MB DirectX 9 Compatible Display Minimum 1024 x 768 16bit colour Recommended 1280 x 1024 32bit colour Widescreen Format Yes (minimum vertical resolution 800) Dual Monitor Yes Font Settings Only 96 DPI font settings are supported Explorer Internet Minimum Microsoft Internet Explorer 11 Network (LAN) Minimum 100 MB Ethernet (not required on standalone PC) Recommended
    [Show full text]
  • Active @ UNDELETE Users Guide | TOC | 2
    Active @ UNDELETE Users Guide | TOC | 2 Contents Legal Statement..................................................................................................4 Active@ UNDELETE Overview............................................................................. 5 Getting Started with Active@ UNDELETE........................................................... 6 Active@ UNDELETE Views And Windows......................................................................................6 Recovery Explorer View.................................................................................................... 7 Logical Drive Scan Result View.......................................................................................... 7 Physical Device Scan View................................................................................................ 8 Search Results View........................................................................................................10 Application Log...............................................................................................................11 Welcome View................................................................................................................11 Using Active@ UNDELETE Overview................................................................. 13 Recover deleted Files and Folders.............................................................................................. 14 Scan a Volume (Logical Drive) for deleted files..................................................................15
    [Show full text]
  • CS 5600 Computer Systems
    CS 5600 Computer Systems Lecture 10: File Systems What are We Doing Today? • Last week we talked extensively about hard drives and SSDs – How they work – Performance characterisEcs • This week is all about managing storage – Disks/SSDs offer a blank slate of empty blocks – How do we store files on these devices, and keep track of them? – How do we maintain high performance? – How do we maintain consistency in the face of random crashes? 2 • ParEEons and MounEng • Basics (FAT) • inodes and Blocks (ext) • Block Groups (ext2) • Journaling (ext3) • Extents and B-Trees (ext4) • Log-based File Systems 3 Building the Root File System • One of the first tasks of an OS during bootup is to build the root file system 1. Locate all bootable media – Internal and external hard disks – SSDs – Floppy disks, CDs, DVDs, USB scks 2. Locate all the parEEons on each media – Read MBR(s), extended parEEon tables, etc. 3. Mount one or more parEEons – Makes the file system(s) available for access 4 The Master Boot Record Address Size Descripon Hex Dec. (Bytes) Includes the starEng 0x000 0 Bootstrap code area 446 LBA and length of 0x1BE 446 ParEEon Entry #1 16 the parEEon 0x1CE 462 ParEEon Entry #2 16 0x1DE 478 ParEEon Entry #3 16 0x1EE 494 ParEEon Entry #4 16 0x1FE 510 Magic Number 2 Total: 512 ParEEon 1 ParEEon 2 ParEEon 3 ParEEon 4 MBR (ext3) (swap) (NTFS) (FAT32) Disk 1 ParEEon 1 MBR (NTFS) 5 Disk 2 Extended ParEEons • In some cases, you may want >4 parEEons • Modern OSes support extended parEEons Logical Logical ParEEon 1 ParEEon 2 Ext.
    [Show full text]
  • Ext4 File System and Crash Consistency
    1 Ext4 file system and crash consistency Changwoo Min 2 Summary of last lectures • Tools: building, exploring, and debugging Linux kernel • Core kernel infrastructure • Process management & scheduling • Interrupt & interrupt handler • Kernel synchronization • Memory management • Virtual file system • Page cache and page fault 3 Today: ext4 file system and crash consistency • File system in Linux kernel • Design considerations of a file system • History of file system • On-disk structure of Ext4 • File operations • Crash consistency 4 File system in Linux kernel User space application (ex: cp) User-space Syscalls: open, read, write, etc. Kernel-space VFS: Virtual File System Filesystems ext4 FAT32 JFFS2 Block layer Hardware Embedded Hard disk USB drive flash 5 What is a file system fundamentally? int main(int argc, char *argv[]) { int fd; char buffer[4096]; struct stat_buf; DIR *dir; struct dirent *entry; /* 1. Path name -> inode mapping */ fd = open("/home/lkp/hello.c" , O_RDONLY); /* 2. File offset -> disk block address mapping */ pread(fd, buffer, sizeof(buffer), 0); /* 3. File meta data operation */ fstat(fd, &stat_buf); printf("file size = %d\n", stat_buf.st_size); /* 4. Directory operation */ dir = opendir("/home"); entry = readdir(dir); printf("dir = %s\n", entry->d_name); return 0; } 6 Why do we care EXT4 file system? • Most widely-deployed file system • Default file system of major Linux distributions • File system used in Google data center • Default file system of Android kernel • Follows the traditional file system design 7 History of file system design 8 UFS (Unix File System) • The original UNIX file system • Design by Dennis Ritche and Ken Thompson (1974) • The first Linux file system (ext) and Minix FS has a similar layout 9 UFS (Unix File System) • Performance problem of UFS (and the first Linux file system) • Especially, long seek time between an inode and data block 10 FFS (Fast File System) • The file system of BSD UNIX • Designed by Marshall Kirk McKusick, et al.
    [Show full text]
  • Comparing Filesystem Performance: Red Hat Enterprise Linux 6 Vs
    COMPARING FILE SYSTEM I/O PERFORMANCE: RED HAT ENTERPRISE LINUX 6 VS. MICROSOFT WINDOWS SERVER 2012 When choosing an operating system platform for your servers, you should know what I/O performance to expect from the operating system and file systems you select. In the Principled Technologies labs, using the IOzone file system benchmark, we compared the I/O performance of two operating systems and file system pairs, Red Hat Enterprise Linux 6 with ext4 and XFS file systems, and Microsoft Windows Server 2012 with NTFS and ReFS file systems. Our testing compared out-of-the-box configurations for each operating system, as well as tuned configurations optimized for better performance, to demonstrate how a few simple adjustments can elevate I/O performance of a file system. We found that file systems available with Red Hat Enterprise Linux 6 delivered better I/O performance than those shipped with Windows Server 2012, in both out-of- the-box and optimized configurations. With I/O performance playing such a critical role in most business applications, selecting the right file system and operating system combination is critical to help you achieve your hardware’s maximum potential. APRIL 2013 A PRINCIPLED TECHNOLOGIES TEST REPORT Commissioned by Red Hat, Inc. About file system and platform configurations While you can use IOzone to gauge disk performance, we concentrated on the file system performance of two operating systems (OSs): Red Hat Enterprise Linux 6, where we examined the ext4 and XFS file systems, and Microsoft Windows Server 2012 Datacenter Edition, where we examined NTFS and ReFS file systems.
    [Show full text]
  • MY PASSPORT™ SSD Portable Hard Drive User Manual Accessing Online Support Visit Our Product Support Website at and Choose from These Topics
    MY PASSPORT™ SSD Portable Hard Drive User Manual Accessing Online Support Visit our product support website at http://support.wdc.com and choose from these topics: ▪ Downloads — Download software and updates for your WD product ▪ Registration — Register your WD product to get the latest updates and special offers at http://register.wdc.com. You can also register using WD Discovery software. ▪ Warranty & RMA Services — Get warranty, product replacement (RMA), RMA status, and data recovery information ▪ Knowledge Base — Search by keyword, phrase, or Answer ID ▪ Installation — Get online installation help for your WD product or software ▪ WD Community — Share your thoughts and connect with other WD users at http://community.wdc.com Table of Contents _________ Accessing Online Support.................................................................................ii _________ 1 About Your WD Drive.................................................................................... 1 Features.............................................................................................................................1 Kit Contents......................................................................................................................2 Optional Accessories.......................................................................................................2 Operating System Compatibility....................................................................................2 Disk Drive Format............................................................................................................
    [Show full text]
  • Mobility for the Masses Unleashing a World of Possibilities
    Mobility for the Masses Unleashing a World of Possibilities Uday Marty Director of Product Marketing Mobile Platforms Group Risk Factors Today’s presentations contain forward-looking statements. All statements made that are not historical facts are subject to a number of risks and uncertainties, and actual results may differ materially. Please refer to our most recent Earnings Release and our most recent Form 10-Q or 10-K filing available on our website for more information on the risk factors that could cause actual results to differ. Copyright © 2009 Intel Corporation Agenda • Today’s news • Current environment • The latest on Intel’s mobile platforms • Ultra-thin laptops come to the mainstream • Expanded wireless capability • Summary Copyright © 2009 Intel Corporation This presentation and materials related to it are under embargo until June 1, 2009, 9 p.m. PDT Copyright © 2009 Intel Corporation Today’s News What’s launching today: – Three new Intel® Core®2 Duo processors (T9900, P9700, and P8800) – New ULV Intel® Pentium® processor (SU2700) – New Mobile Intel® GS40 Express Chipset Enabling significant improvements in the four vectors of mobility – Extended performance leadership – Enabling Ultra-thin systems at mainstream price points – Enhancing battery life – Expanded wireless capabilities For more information, go to – http://www.intel.com/pressroom/kits/events/computex2009 Copyright © 2009 Intel Corporation Worldwide Mobile Growth Continues Mobile Shift Strong Across Mature and Emerging Markets Source: IDC Worldwide Quarterly PC
    [Show full text]
  • Refs: Is It a Game Changer? Presented By: Rick Vanover, Director, Technical Product Marketing & Evangelism, Veeam
    Technical Brief ReFS: Is It a Game Changer? Presented by: Rick Vanover, Director, Technical Product Marketing & Evangelism, Veeam Sponsored by ReFS: Is It a Game Changer? OVERVIEW Backing up data is more important than ever, as data centers store larger volumes of information and organizations face various threats such as ransomware and other digital risks. Microsoft’s Resilient File System or ReFS offers a more robust solution than the old NT File System. In fact, Microsoft has stated that ReFS is the preferred data volume for Windows Server 2016. ReFS is an ideal solution for backup storage. By utilizing the ReFS BlockClone API, Veeam has developed Fast Clone, a fast, efficient storage backup solution. This solution offers organizations peace of mind through a more advanced approach to synthetic full backups. CONTEXT Rick Vanover discussed Microsoft’s Resilient File System (ReFS) and described how Veeam leverages this technology for its Fast Clone backup functionality. KEY TAKEAWAYS Resilient File System is a Microsoft storage technology that can transform the data center. Resilient File System or ReFS is a valuable Microsoft storage technology for data centers. Some of the key differences between ReFS and the NT File System (NTFS) are: ReFS provides many of the same limits as NTFS, but supports a larger maximum volume size. ReFS and NTFS support the same maximum file name length, maximum path name length, and maximum file size. However, ReFS can handle a maximum volume size of 4.7 zettabytes, compared to NTFS which can only support 256 terabytes. The most common functions are available on both ReFS and NTFS.
    [Show full text]
  • NOVA: a Log-Structured File System for Hybrid Volatile/Non
    NOVA: A Log-structured File System for Hybrid Volatile/Non-volatile Main Memories Jian Xu and Steven Swanson, University of California, San Diego https://www.usenix.org/conference/fast16/technical-sessions/presentation/xu This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST ’16). February 22–25, 2016 • Santa Clara, CA, USA ISBN 978-1-931971-28-7 Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX NOVA: A Log-structured File System for Hybrid Volatile/Non-volatile Main Memories Jian Xu Steven Swanson University of California, San Diego Abstract Hybrid DRAM/NVMM storage systems present a host of opportunities and challenges for system designers. These sys- Fast non-volatile memories (NVMs) will soon appear on tems need to minimize software overhead if they are to fully the processor memory bus alongside DRAM. The result- exploit NVMM’s high performance and efficiently support ing hybrid memory systems will provide software with sub- more flexible access patterns, and at the same time they must microsecond, high-bandwidth access to persistent data, but provide the strong consistency guarantees that applications managing, accessing, and maintaining consistency for data require and respect the limitations of emerging memories stored in NVM raises a host of challenges. Existing file sys- (e.g., limited program cycles). tems built for spinning or solid-state disks introduce software Conventional file systems are not suitable for hybrid mem- overheads that would obscure the performance that NVMs ory systems because they are built for the performance char- should provide, but proposed file systems for NVMs either in- acteristics of disks (spinning or solid state) and rely on disks’ cur similar overheads or fail to provide the strong consistency consistency guarantees (e.g., that sector updates are atomic) guarantees that applications require.
    [Show full text]
  • Module 12: Using Advanced Windows Powershell Techniques
    Module 12: Using advanced Windows PowerShell techniques Lab: Practicing advanced techniques Exercise 1: Creating a profile script Task 1: Create a profile script • A script that performs these tasks is located at: E:\Mod12\Labfiles\10961C_Mod12_LabA_Ex1_LAK.txt Results: After completing this exercise, you should have created a profile script. Exercise 2: Verifying the validity of an IP address Task 1: Verify the validity of an IP address • A script that performs these tasks is located at: E:\Mod12\labfiles\10961C_Mod12_LabA_Ex2_LAK.txt. Results: After completing this exercise, you should have created a script that verifies the validity of an IP address. Exercise 3: Reporting disk information Task 1: Report disk information • A script that performs these tasks is located at: E:\Mod12\labfiles\10961C_Mod12_LabA_Ex3_LAK.txt. Results: After completing this exercise, you should have created a script that reports disk space on a server. Exercise 4: Querying NTFS permissions Task 1: Query NTFS permissions • A script that performs these tasks is located at: E:\Mod12\labfiles\10961C_Mod12_LabA_Ex4_LAK.txt. Results: After completing this exercise, you will have created a module that you can use to query NTFS permissions. Exercise 5: Creating user accounts with passwords from a CSV file Task 1: Create user accounts with a password from a CSV file • A script that performs these tasks is located at: E:\Mod12\labfiles\10961C_Mod12_LabA_Ex5_LAK.txt. Results: After completing this exercise, you will have created a script that will create new user accounts from a CSV file. Task 2: Prepare for the end of the course When you have finished the lab, revert the virtual machines to their initial state.
    [Show full text]
  • FWD-47W800P 47" BRAVIA Professional Full HD LED Display
    FWD-47W800P 47" BRAVIA Professional Full HD LED display Overview Slim, energy-saving screen for corporate display and digital signage applications This slim, energy efficient 47” Full HD LED display is the smart way to make your point in boardrooms and offices, public spaces, retail venues and schools. It’s easy to install, with plentiful connections and Wi-Fi networking on board. USB playback and support for web-friendly HTML5 simplifies low-cost signage applications. Features Edge LED Backlight with Frame Dimming Impress your audience with high-contrast Full HD images; Frame Dimming intelligently adjusts backlight levels to save energy. HTML support for simple box-free digital signage HTML5 browser displays networked content – including text, graphics, video and web feeds – with no dedicated hardware player needed. D-Sub 15 pin and HDMI input connections Easily link BRAVIA to a PC or signage player via the display’s standard D-Sub 15 pin connector, or via HDMI. Customisable display settings © 2004 - 2021 Sony Corporation. All rights reserved. 1 Reproduction in whole or in part without written permission is prohibited. Features and specifications are subject to change without notice. The values for mass and dimension are approximate. All trademarks are the property of their respective owners. Customise and store display settings and features for certain business requirements. Settings can be copied from display to display via USB flash memory. Styled to impress Enhance any business environment or public space with stylish, contemporary ‘Quartz Edge’ design and super- slim 17mm bezel. Integrated media player Play videos and other media content direct from USB flash memory in wide range of formats.
    [Show full text]