Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Algorithms and data structures for flash memories
ACM Computing Surveys (CSUR)
Data remanence in semiconductor devices
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Secure deletion of data from magnetic and solid-state memory
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Secure deletion for NAND flash file system
Proceedings of the 2008 ACM symposium on Applied computing
Lest we remember: cold-boot attacks on encryption keys
Communications of the ACM - Security in the Browser
Characterizing flash memory: anomalies, observations, and applications
Proceedings of the 42nd Annual IEEE/ACM International Symposium on Microarchitecture
Deduplicating Devices Considered Harmful
Queue - Programming Languages
ShiftFlash: Make flash-based storage more resilient and robust
Performance Evaluation
A semantic hierarchy for erasure policies
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Data node encrypted file system: efficient secure deletion for flash memory
Security'12 Proceedings of the 21st USENIX conference on Security symposium
BVSSD: build built-in versioning flash-based solid state drives
Proceedings of the 5th Annual International Systems and Storage Conference
Secure communication over diverse transports: [short paper]
Proceedings of the 2012 ACM workshop on Privacy in the electronic society
Eternal sunshine of the spotless machine: protecting privacy with ephemeral channels
OSDI'12 Proceedings of the 10th USENIX conference on Operating Systems Design and Implementation
TrueErase: per-file secure deletion for the storage data path
Proceedings of the 28th Annual Computer Security Applications Conference
A survey of address translation technologies for flash memories
ACM Computing Surveys (CSUR)
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
A comprehensive black-box methodology for testing the forensic characteristics of solid-state drives
Proceedings of the 29th Annual Computer Security Applications Conference
The harey tortoise: managing heterogeneous write performance in SSDs
USENIX ATC'13 Proceedings of the 2013 USENIX conference on Annual Technical Conference
Password-based single-file encryption and secure data deletion for solid-state drive
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication
Memory efficient sanitization of a deduplicated storage system
FAST'13 Proceedings of the 11th USENIX conference on File and Storage Technologies
Hi-index | 0.00 |
Reliably erasing data from storage media (sanitizing the media) is a critical component of secure data management. While sanitizing entire disks and individual files is well-understood for hard drives, flash-based solid state disks have a very different internal architecture, so it is unclear whether hard drive techniques will work for SSDs as well. We empirically evaluate the effectiveness of hard drive-oriented techniques and of the SSDs' built-in sanitization commands by extracting raw data from the SSD's flash chips after applying these techniques and commands. Our results lead to three conclusions: First, built-in commands are effective, but manufacturers sometimes implement them incorrectly. Second, overwriting the entire visible address space of an SSD twice is usually, but not always, sufficient to sanitize the drive. Third, none of the existing hard drive-oriented techniques for individual file sanitization are effective on SSDs. This third conclusion leads us to develop flash translation layer extensions that exploit the details of flash memory's behavior to efficiently support file sanitization. Overall, we find that reliable SSD sanitization requires built-in, verifiable sanitize operations.