Forensic potentials of solid state drives

Zubair Shah*, Abdun Naser Mahmood, Jill Slay

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Citations (Scopus)

Abstract

Extracting useful information from Solid State Drives (SSD) is a challenging but important forensic task. However, there are opposing views [14,15,22] that (1) SSDs destroy the forensics evidences automatically and (2) even after sanitization of SSDs, data can be recovered. This paper investigates this issue and reports experimental findings that identify the reason why certain SSDs seem to destroy forensic evidences while other SSDs do not. The experiments provide insight and analyses of the behaviour of SSDs when certain software components, such as Background Garbage Collector (BGC) and Operating System functions, such as TRIM, are executed on the SSD.

Original languageEnglish
Title of host publicationInternational Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Revised Selected Papers
EditorsMudhakar Srivatsa, Jing Tian, Jiwu Jing
PublisherSpringer Verlag
Pages113-126
Number of pages14
ISBN (Print)9783319238012
DOIs
Publication statusPublished - 2015
Externally publishedYes
Event10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014 - Beijing, China
Duration: 24 Sept 201426 Sept 2014

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
Volume153
ISSN (Print)1867-8211

Conference

Conference10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014
Country/TerritoryChina
CityBeijing
Period24/09/1426/09/14

Keywords

  • Forensics
  • SSD
  • Solid state drives

Fingerprint

Dive into the research topics of 'Forensic potentials of solid state drives'. Together they form a unique fingerprint.

Cite this