Security of SSD Drives with Full Disk Encryption and Some Attacks (in Bulgarian)

Publication Type:



IT4Sec Reports, Institute of Information and Communication Technologies, Number 113, Sofia (2014)


BIOS, cold boot, DMA, hot plug, RAM, SSD, атаки, защита, противодействие, Пълно дисково криптиране, самокриптиращ, сигурност, техники


“Security of SSD Drives with Full Disk Encryption and Some Attacks “Full disk encryption of SSD drives is considered to be fast and safe alternative to software-based solutions like TrueCrypt and Bitlocker. Since encryption keys are stored in encrypted chip on the disc or on encrypted partition instead of the RAM or the memory of the main processor, the traditional attacks like cold reboot seem not to be applicable. This report demonstrates that, depending on the configuration, full disk encryption can be as uncertain as the software disk encryption. The reason for this is an amazingly simple attack that exploits the fact that the self-encrypting disk does not detect whether the SATA cable is connected to another computer, which effectively turns the self-encrypting disc in self-decrypting one.
Further, the report examines some attacks in the field of software-based disk encryption and their adaptation to different computer systems, including laptops and desktops.

Full text (HTML): 



Last updated: Wednesday, 11 February 2015