首页> 外文会议>IEEE Symposium on Security and Privacy >Self-Encrypting Deception: Weaknesses in the Encryption of Solid State Drives
【24h】

Self-Encrypting Deception: Weaknesses in the Encryption of Solid State Drives

机译:自加密欺骗:固态驱动器加密中的弱点

获取原文

摘要

We have analyzed the hardware full-disk encryption of several solid state drives (SSDs) by reverse engineering their firmware. These drives were produced by three manufacturers between 2014 and 2018, and are both internal models using the SATA and NVMe interfaces (in a M.2 or 2.5" traditional form factor) and external models using the USB interface. In theory, the security guarantees offered by hardware encryption are similar to or better than software implementations. In reality, we found that many models using hardware encryption have critical security weaknesses due to specification, design, and implementation issues. For many models, these security weaknesses allow for complete recovery of the data without knowledge of any secret (such as the password). BitLocker, the encryption software built into Microsoft Windows will rely exclusively on hardware full-disk encryption if the SSD advertises support for it. Thus, for these drives, data protected by BitLocker is also compromised. We conclude that, given the state of affairs affecting roughly 60% of the market, currently one should not rely solely on hardware encryption offered by SSDs and users should take additional measures to protect their data.
机译:我们通过对固件进行反向工程分析了几个固态驱动器(SSD)的硬件全盘加密。这些驱动器由三家制造商在2014年至2018年之间生产,既是内部模型,使用SATA和NVMe接口(采用M.2或2.5英寸传统外形尺寸),外部模型则使用USB接口。从理论上讲,安全性得到了保证。实际上,我们发现许多使用硬件加密的模型由于规格,设计和实现方面的问题而具有严重的安全缺陷,对于许多模型,这些安全缺陷使得可以完全恢复硬件。不知道任何秘密(例如密码)的数据。如果SSD宣布支持,则Microsoft Windows内置的加密软件BitLocker将仅依赖硬件全盘加密。因此,对于这些驱动器,受BitLocker保护的数据我们得出的结论是,鉴于影响大约60%市场的交易状况,目前不应仅依靠艰苦的战争SSD和用户提供的加密应采取其他措施来保护其数据。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号