SSD drives difficult to wipe securely, researchers find

Today's software can't destroy drives or files

Current methods for securely wiping data from magnetic hard disks simply aren't reliable enough to use on solid state drives (SSDs), a detailed study by engineers at the University of California has found.

The techies at the university's Department of Computer Science and Engineering uncovered a range of problems in secure SSD 'sanitisation' of both whole drives and individual files, starting with problems in the way some drive firmware implemented the ATA/SCSI commands to conduct the erase function.

The researchers tested twelve unnamed SSD drives, and found that only four of them successfully erased the test whole-drive fingerprint image. Of the remaining eight, four did not support data erasure (three of these were removable USB drives), one was encrypted and so erasure could not be verified.

Three drives failed, two because of bugs in the firmware, and one reported success despite the fact that all data on it remained intact and accessible.

The results for wiping a single file from an SSD using a range of common sanitisation protocols were even worse, with between four per cent and 75 per cent of the data recoverable. USB drives fared poorly as well, with between 0.57 per cent and 84.9 per cent of data still accessible.

The team even tried a recommended NSA degaussing machine against the drives just to confirm that this technique does not work against flash memory cells. As expected, the degausser had no effect on any of the drives.

The core of the problem is that unlike magnetic media, SSD drives save data to physical pages but erase from logical block addresses (LBAs), a process which is managed through a flash translation layer (FTL). This creates a mismatch between where the ATA or SCSI drivers think the data is and where it physically resides which the drives compensate for by copying data around. It is this copying that leaves insecure traces littered around the drive.

"These differences between hard drives and SSDs potentially lead to a dangerous disconnect between user expectations and the drive's actual behaviour," comment the researchers. "An SSD's owner might apply a hard drive-centric sanitisation technique under the misguided belief that it will render the data essentially irrecoverable. In truth, data may remain on the drive and require only moderate sophistication to extract."

In other words, the assumption that established wiping techniques will simply work on SSDs and flash media in general turn out to be flawed. Sometimes they work, sometimes they fail due to poor implementation and in the case if single files, smoe new thinking will be required.

The degree of difficulty in securely wiping single files from SSDs will alarm IT admins most because this is an everyday requirement, for example when trying to destroy encryption keys, spreadsheets and other important files without nuking the whole drive.

The researchers conclude by suggesting several techniques through which the SSD FTL could be modified to take account of the need for security.

Join the CSO newsletter!

Error: Please check your email address.

Tags SSDDrivesstoragesecurity

More about NSA

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by John E Dunn

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts