Latest Updates

Experts warn about SSD security risks

Posted at 26 August 2008 11:11 CET by Seán Byrne

As Solid State Drives (SSDs) gradually replace hard disks over the coming years, particularly in laptops, security experts are warning about the additional security risks of using SSDs.  It turns out that SSDs are vulnerable to physical hacking against both the flash memory and the chips that secure the SSDs and that traditional data shredding software is ineffective due to the wear-levelling process SSDs use to prolong the life of the flash cells.

Most SSDs use NAND chips much like those found in flash memory cards for digital cameras, which can be easily desoldered by a hacker and read using a flash chip programmer to get around locked SSDs, e.g. where the drive is password protected, but not encrypted.  Afterwards, it is just a matter of using a disk recovery utility to reassemble the files from the data read out from the chips.  

For controllers that use lock bits or encryption locks, another hack involves using a UV laser to wipe out the lock bits from fuses on the chip that secures the SSD.  According to a chip hacker, nicknamed Bunnie, it is just a matter of using a conventional ROM reader to interface with the hacked chip once unlocked.  However, SSDs that use an additional layer of hardware level encryption are resistant to the attack, unless the hacker manages to unlock the encryption keys.

As SSDs use wear-levelling to write data evenly across all the flash cells to avoid some cells being written to more times than others, this opens up another security risk for those that rely on traditional software based data shredding tools to destroy files, where hardware level encryption is not in use.  A data shredder traditionally works by overwriting all bytes of a file with random data to prevent a data recovery tool from "undeleting" it.  

However, due to the wear-levelling process on an SSD, overwriting a file with random data will likely result in different physical flash cells being written to, leaving the original flash cells that were used by the file untouched.  As a result, these flash cells could potentially be read back at a later stage.  So unless the data shredding software is designed to work with the wear-levelling process on SSDs, it can make it difficult to completely wipe sensitive data from an SSD, at least without carrying out a full low level format of the flash drive.  

Click to share

There are 5 comments

No longer with us
Posted on: 26 Aug 08 19:45
    I don't see the bad thing about ones data being SAFE and can be recovered But i do see the bad thing in using password on a private pc. :P
    No longer with us
    Posted on: 26 Aug 08 20:45
      The first risk is the same as regular hard drives so I don't see how it needs warning actually I think it's a lot easier then you think. If your using a ssd like goes in your sata slot then your oh so much more vulnerable then you think. If the chip is soldered as part of an mp3 player then your still pretty safe cause most people in the world don't have the intelligence or technology to circumvent such obsticals. The second one is kinda worriesome but most people don't swipe there content anyway and if they did this important information should be encrypted since it seems your so important that someone is actually looking for said information.
      MyCE Member
      Posted on: 27 Aug 08 03:36
        Most security experts agree that both SSDs and other recordable media can be effectively erased with thermite (
        CD Freaks Rookie
        Posted on: 27 Aug 08 09:28
          OK, that last one definitely deserved a LOL.
          No longer with us
          Posted on: 30 Aug 08 00:55
            How exactly would this be different than reallocated sectors on existing platter hard drives?

            I assume that there would be at least some residual data on those as well.

            Understand of course that a low-level would wipe those too, but that's no different than their suggestion for SSD, no?

            - JCS

            Post your comment

            You need to register before you can comment

            Like us

            Most popular headlines

            Nexus Player to be codenamed Fugu and powered by Intel Atom SoC (updated)

            Traces in the Android source code give us hints that the next Nexus device will ...

            Free software decrypts and converts Blu-ray disc to 2% of its size with nearly same quality

            The Spanish company CineMartin claims to have developed software that makes it p...

            Windows 7 no longer sold to consumers - all about Windows 8.1 now

            Microsoft will no longer sell computers with Windows 7 installed starting t...

            First tests of Cinemartin MyBD show it does what it promises

            Our firsts with the free version of Cinemartin MyBD indicate that the software d...

            Office 16 for Mac images leak online

            We've heard a lot about the next version Office, codenamed Office 16, but every ...

            See all headlines