@inproceedings{cb888a6d2dd2461aaf3f5020704ae6ca,
title = "Forensic potentials of solid state drives",
abstract = "Extracting useful information from Solid State Drives (SSD) is a challenging but important forensic task. However, there are opposing views [14,15,22] that (1) SSDs destroy the forensics evidences automatically and (2) even after sanitization of SSDs, data can be recovered. This paper investigates this issue and reports experimental findings that identify the reason why certain SSDs seem to destroy forensic evidences while other SSDs do not. The experiments provide insight and analyses of the behaviour of SSDs when certain software components, such as Background Garbage Collector (BGC) and Operating System functions, such as TRIM, are executed on the SSD.",
keywords = "Forensics, SSD, Solid state drives",
author = "Zubair Shah and Mahmood, {Abdun Naser} and Jill Slay",
note = "Publisher Copyright: {\textcopyright} Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2015.; 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014 ; Conference date: 24-09-2014 Through 26-09-2014",
year = "2015",
doi = "10.1007/978-3-319-23802-9_11",
language = "English",
isbn = "9783319238012",
series = "Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST",
publisher = "Springer Verlag",
pages = "113--126",
editor = "Mudhakar Srivatsa and Jing Tian and Jiwu Jing",
booktitle = "International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Revised Selected Papers",
address = "Germany",
}