Allure Massage

Erasing data from flash drives extremely difficult

jwmorrice

Gentleman by Profession
Jun 30, 2003
7,133
2
0
In the laboratory.
Original URL: http://www.theregister.co.uk/2011/02/21/flash_drive_erasing_peril/

Flash drives dangerously hard to purge of sensitive data
When secure wiping isn't
By Dan Goodin in San Francisco

Posted in Security, 21st February 2011 22:27 GMT


In research that has important findings for banks, businesses and security buffs everywhere, scientists have found that computer files stored on solid state drives are sometimes impossible to delete using traditional disk-erasure techniques.

Even when the next-generation storage devices show that files have been deleted, as much as 75 percent of the data contained in them may still reside on the flash-based drives, according to the research, which is being presented this week [1] at the Usenix FAST 11 conference in California. In some cases, the SSDs, or sold-state drives, incorrectly indicate the files have been "securely erased" even though duplicate files remain in secondary locations.

The difficulty of reliably wiping SSDs stems from their radically different internal design. Traditional ATA and SCSI hard drives employ magnetizing materials to write contents to a physical location that's known as the LBA, or logical block address. SSDs, by contrast, use computer chips to store data digitally and employ an FTL, or flash translation later, to manage the contents. When data is modified, the FTL frequently writes new files to a different location and updates its map to reflect the change.

In the process left-over data from the old file, which the authors refer to as digital remnants, remain.

“These differences between hard drives and SSDs potentially lead to a dangerous disconnect between user expectations and the drive's actual behavior,” the scientists, from the University of California at San Diego, wrote in a 13-page paper. “An SSD's owner might apply a hard drive-centric sanitization technique under the misguided belief that it will render the data essentially irrecoverable. In truth, data may remain on the drive and require only moderate sophistication to extract.”

Indeed, the researchers found that as much 67 percent of data stored in a file remained even after it was deleted from an SSD using the secure erase feature offered by Apple's Mac OS X. Other overwrite operations – which securely delete files by repeatedly rewriting the data stored in a particular disk location – failed by similarly large margins when used to erase a single file on an SSD. Pseudorandom Data operations, for instance, allowed as much as 75 percent of data to remain, while the British HMG IS5 technique allowed as much as 58 percent.

Singling out one or more files to be erased is the only sanitization technique that allows the disk on which the data is stored to continue being used. And yet the researchers found that all single-file overwrite techniques failed to remove all digital remnants, even when the procedure was accompanied by disk defragmenting, which rearranges the remaining data in the file system.

“Our data shows that overwriting is ineffective and that the 'erase procedures provided by the manufacturer' may not work properly in all cases,” the paper warns.

Whole-disk wiping techniques faired only slightly better with SSD media. In the most extreme case, one unnamed SSD model still stored 1 percent of its 1 GB of data even after 20 sequential overwrite passes on the entire device. Other drives were able to securely purge their contents after two passes, but most of them required from 58 hours to 121 hours for a single pass, making the technique unviable in most settings.

The researchers also found serious failures when subjecting SSD media to degaussing, in which a drive's low-level formatting is destroyed. Because degaussing attacks magnetism-based features of disks, it is ineffective when applied to to next-generation storage devices. “In all cases, the data remained intact,” the researchers wrote.

The researchers found the most effective way to sanitize data on SSDs was to use devices that encrypted their contents. Wiping happens by deleting the encryption keys from what's known as the key store, effectively ensuring that the data will remain encrypted forever.

“The danger, however, is that it relies on the controller to properly sanitize the internal storage location that holds the encryption key and any other derive values that might be useful in cryptanalysis,” the researchers wrote. “Given the bugs we found in some implementations of secure erase commands, it is unduly optimistic to assume that SSD vendors will properly sanitize the key store. Furthermore, there is no way to verify that erasure has occurred (e.g., by dismantling the drive).”

The findings were recorded by writing files with identifiable patterns to SSDs and then using a field-programmable gate array device device to search for the fingerprint after using secure erasure techniques to delete the files. The researchers' device cost about $1,000, but “a simpler, microcontroller-based version would cost as little as $200, and would require only a moderate amount of technical skill to construct,” they said.

Right now, SSDs are most often encountered in USB thumb drives, and it's not unusual for them to hold as much as 32 GB of data. An increasing number of laptops by default ship with SSDs installed as the primary storage mechanism. Flash storage underpins that vast majority of smartphones, as well.

A PDF of the paper is here [2]. ®

Links
http://www.usenix.org/events/fast11/tech/tech.html#Wei
http://www.usenix.org/events/fast11/tech/full_papers/Wei.pdf
 

WoodPeckr

Protuberant Member
May 29, 2002
47,064
6,195
113
North America
thewoodpecker.net
Well that really sucks!
Thanks for the report.
 

onthebottom

Never Been Justly Banned
Jan 10, 2002
40,881
197
63
Hooterville
www.scubadiving.com
That does suck - don't lose them or give them away....
 

djk

Active member
Apr 8, 2002
5,937
0
36
the hobby needs more capitalism
For insurance, use PGP. It comes with something called PGP shredder which meets US DoD requirements for secure deletion. I suspect it should do ok in this situation.

Also you can encrypt the whole drive before you start storing files on it. AFAIK, if someone tries to recover anything, they'll be recovering just the encrypted file system, not your info.

Edit: I just read the paper and it says in one chart that US DoD 5220.22-M secure deletion done 7 times has the lowest recovery rate of between 0.01 to 4.1% on SSD or 0.0 to 8.9% on USB. Not too sure what standard PGP shredder uses but this is just more reason that if you want to keep your data private and secure, use encryption.
 

Cassini

Active member
Jan 17, 2004
1,158
0
36
For insurance, use PGP.
I don't think the secure erase tools can reliably completely erase a USB key. Watching the inards of a broken memory device with specialized tools is a scary experience. The data doesn't disappear.

Personally, I would use a shredder. Other people report successes with saws and presses. Be careful with incinerators, as the circuit boards can release dioxins.

If you care about data security, hard drives are much easier to destroy than USB keys.
 

djk

Active member
Apr 8, 2002
5,937
0
36
the hobby needs more capitalism
I don't think the secure erase tools can reliably completely erase a USB key. Watching the inards of a broken memory device with specialized tools is a scary experience. The data doesn't disappear.

Personally, I would use a shredder. Other people report successes with saws and presses. Be careful with incinerators, as the circuit boards can release dioxins.

If you care about data security, hard drives are much easier to destroy than USB keys.
Good info. Correct me if I'm wrong but if you encrypt the hard drive (or USB key) first then start storing data on it. If someone tries to recover anything, they would be recovering the encrypted volume data, correct?
 

WoodPeckr

Protuberant Member
May 29, 2002
47,064
6,195
113
North America
thewoodpecker.net
If someone tries to recover anything, they would be recovering the encrypted volume data, correct?
Correct.
All they will see is encrypted data.
 

Cassini

Active member
Jan 17, 2004
1,158
0
36
Correct. All they will see is encrypted data.
I think one manufacturer was busted in Europe for selling a "military" level encrypted USB key to several different government spy agencies where the "encryption" was simply a password.

Make sure what you purchase is actually doing encryption, and not simply password protecting data. Effective encryption is hard. Alternatively, create the encrypted file system inside the operating system.
 

djk

Active member
Apr 8, 2002
5,937
0
36
the hobby needs more capitalism
I think one manufacturer was busted in Europe for selling a "military" level encrypted USB key to several different government spy agencies where the "encryption" was simply a password.

Make sure what you purchase is actually doing encryption, and not simply password protecting data. Effective encryption is hard. Alternatively, create the encrypted file system inside the operating system.
I use PGP and I encrypt the USB stick or hard drive immediately if I plan to use it to house any sensitive data. I suspect I'll be fine.
 

WoodPeckr

Protuberant Member
May 29, 2002
47,064
6,195
113
North America
thewoodpecker.net
FWIW, remember if you take your laptop across the border and Customs checks it, they will demand you allow them access to your encripted data. If you refuse they can keep your laptop, flash drives, etc if they desire. I have never had my laptop checked but only bring a 'clean' laptop into Canada, just in case they or the US decide to check it when I return.
 

jwmorrice

Gentleman by Profession
Jun 30, 2003
7,133
2
0
In the laboratory.
FWIW, remember if you take your laptop across the border and Customs checks it, they will demand you allow them access to your encripted data. If you refuse they can keep your laptop, flash drives, etc if they desire. I have never had my laptop checked but only bring a 'clean' laptop into Canada, just in case they or the US decide to check it when I return.
And if it was "checked", could you ever again use it with confidence? Who knows what Homeland spyware may have been put on it.

jwm
 

zorlack

New member
Jul 7, 2010
230
0
0
funny, I was just gonna post about it too :)
http://www.itworld.com/security/137860/solid-state-drives-refuse-delete-data

ifya use SSD, use encryption.

on Linux you could even run an encrypted file system...however do not put a Linux-Swap partition on an SSD, both to save wear & tear, and stop a potential data leak.

heck with crossing international borders while toting notebook computers, smartphones or other such gadgets..ifya do, make sure they are thoroughly encrypted...I do not trust anyone, someone could frame you, easy to fake time stamps on file dates and all...so they can take credit & get a promotion for "finding" bomb plans, stolen creditcard database, childporn, etc. which they put there.

cheers!
 

WoodPeckr

Protuberant Member
May 29, 2002
47,064
6,195
113
North America
thewoodpecker.net
...on Linux you could even run an encrypted file system...however do not put a Linux-Swap partition on an SSD, both to save wear & tear, and stop a potential data leak.
Read that some suggest not even bothering with creating a swap file partition if you have a ton of RAM. Is this a good idea? So far I have alway had a swap partition.
 

JohnHenry

Well-known member
Aug 27, 2003
1,435
395
83
rural ontario
Read that some suggest not even bothering with creating a swap file partition if you have a ton of RAM. Is this a good idea? So far I have alway had a swap partition.
Not a good idea. If the system crashes, and starts to write a dump, it does so to the swap partition. If the swap partition is smaller than the installed RAM, there is the possibility that the dump program will write past the end of the swap partition and onto the next (probably root) partition.
 

zorlack

New member
Jul 7, 2010
230
0
0
Dis-information?!? First we are told that SSD is dangerous because data might not ever be completely erased...now this:
http://hardware.slashdot.org/story/11/03/01/1740240/SSDs-Cause-Crisis-For-Digital-Forensics

Any portable gagdet I use, I will password protect & encrypt everything, even though I have nothing to hide. Even GPS units are kinda creepy, police could say oh you were near these coordinates at such and such a time, you are obviously a suspect.

cheers!
 

jwmorrice

Gentleman by Profession
Jun 30, 2003
7,133
2
0
In the laboratory.
Original URL: http://www.theregister.co.uk/2011/03/01/self_destructing_flash_drives/

Self-erasing flash drives destroy court evidence
'Golden age' of forensics coming to close
By Dan Goodin in San Francisco

Posted in ID, 1st March 2011 21:41 GMT


The inner workings of solid state storage devices are so fundamentally different from traditional hard drives that forensic investigators can no longer rely on current preservation techniques when admitting evidence stored on them in court cases, Australian scientists said in a research paper.

Data stored on Flash drives is often subject to a process the scientists called “self-corrosion,” in which evidence is permanently erased or contaminated in ways that bits stored on magnetic-based hard drives are not. The alterations happen in the absence of any instructions from the user. The findings introduce a “grey area” into the integrity of files that are forensically extracted from the devices and threaten to end a “golden age” of digital evidence gathering offered by older storage types.

“Given the pace of development in SSD memory and controller technology, and the increasingly proliferation [sic] of manufacturers, drives, and firmware versions, it will probably never be possible to remove or narrow this new grey area within the forensic and legal domain,” the scientists, from Australia's Murdoch University, wrote. “It seems possible that the golden age for forensic recovery and analysis of deleted data and deleted metadata may now be ending.”

For decades, investigators have worked with tape, floppy drives and hard drives that continue to store huge amounts of information even when the files they're contained in are marked for deletion. Even wiping the disks isn't always enough to permanently erase the contents. SSDs, by contrast, store data in blocks or pages of NAND-based transistor chips that must be electronically erased before they can be reused.

As a result, most SSDs have firmware that automatically carries out “self healing” or “garbage collection” procedures that can permanently erase or alter files that have been marked for deletion. The process often begins as soon as three minutes after the drive is powered on and happens with no warning. The user need not initiate any commands, and the drive emits no lights or makes any sounds to indicate the purging is taking place.

What's more, the use of so-called write blockers and other techniques designed to isolate a drive during forensic imaging offered no protection. That's because the garbage collection is initiated by the SSD firmware that's independent from commands issued by the computer it's attached to.

“If garbage collection were to take place before or during forensic extraction of the drive image, it would result in irreversible deletion of potentially large amounts of valuable data that would ordinarily be gathered as evidence during the forensic process – we call this 'corrosion of evidence,'” the scientists wrote.

The findings have serious consequences for criminal and civil court cases that rely on digital evidence. If the disk from which the data comes appears to have been tampered with after it was seized, an opposing party frequently has grounds for having the evidence thrown out of court. The paper comes as a growing number of computer makers integrate SSDs into the machines they sell. The drives have many benefits over their magnetic brethren, including speed, lower power consumption and durability.

At first blush, the results appear to conflict with those of a recent paper that found data fragments stored on flash drives can be virtually indestructible [1]. It may be the case that what both research teams are saying is that data stored on the newfangled devices can't be reliably deleted or preserved the way it can on magnetic media.

Researchers Graeme B. Bell and Richard Boddington, of Murdoch University's School of IT, arrived at their findings by comparing the way data is preserved on a 64GB Corsair P64 SSD versus an 80GB Hitachi Deskstar hard drive. A PDF of their paper, which previously was published in December in The Journal of Digital Forensics, Security and Law, is here [2]. ®

Links
http://www.theregister.co.uk/2011/02/21/flash_drive_erasing_peril/
http://www.jdfsl.org/subscriptions/JDFSL-V5N3-Bell.pdf
 

WoodPeckr

Protuberant Member
May 29, 2002
47,064
6,195
113
North America
thewoodpecker.net
That sounds reassuring.
OTOH, spies and LE won't like that.
 
B

burt-oh-my!

There is something that to me doesn't make sense in all of this.

Suppose I have a 5 Gg flashdrive. I fill it up. Then I erase it all, and fillit up again. Then repeat. Are they saying that EVERYTHING that was put on itis recoverable? How can you recover say 15 gig of data from a 5 gig drive?
 
Toronto Escorts