Monitoring Device Current to Characterize Trim Operations of Solid-State Drives

Solid-state drives (SSDs) are pervasive in modern computing and have supplanted hard disk drives in many applications. Substantial changes in architecture have brought about not only improvements in speed and energy usage but also new security concerns. The presence of proprietary firmware onboard SSD controllers in particular raises the possibility that data believed by a user or operating system to be deleted physically remains on the drive and can thus be recovered. This security issue has a direct application to malware detection, digital forensics, and consumer privacy. To begin to address this, we propose a novel, noninvasive side-channel approach to infer the SSD trim operation. We demonstrate that it is possible to infer the trim operation with better than 99% accuracy using current probe measurements in conjunction with machine learning techniques. We find that the sampling frequency can be reduced to 200 kSps while maintaining greater than 80% of the total power in the 0–1 MHz band. The classifier accordingly uses only information in the frequency range between 0 and 100 kHz in achieving its high accuracy. We also validate our current probe measurement technique by comparing it with an in-line resistor.

[1]  Hau T. Ngo,et al.  Inferring trimming activity of solid-state drives based on energy consumption , 2016, 2016 IEEE International Instrumentation and Measurement Technology Conference Proceedings.

[2]  Mehdi Kharrazi,et al.  Back to Static Analysis for Kernel-Level Rootkit Detection , 2014, IEEE Transactions on Information Forensics and Security.

[3]  Yuanzhang Li,et al.  Descrambling data on solid-state disks by reverse-engineering the firmware , 2015 .

[4]  Mohammad Yousuf Uddin,et al.  Solid state drive data recovery in open source environment , 2017, 2017 2nd International Conference on Anti-Cyber Crimes (ICACC).

[5]  Onur Mutlu,et al.  Error Characterization, Mitigation, and Recovery in Flash-Memory-Based Solid-State Drives , 2017, Proceedings of the IEEE.

[6]  Jongmoo Choi,et al.  SSD Characterization: From Energy Consumption's Perspective , 2011, HotStorage.

[7]  Eric Peeters,et al.  System-on-Chip Platform Security Assurance: Architecture and Validation , 2018, Proceedings of the IEEE.

[8]  Xiaodong Zhang,et al.  Understanding intrinsic characteristics and system implications of flash memory based solid state drives , 2009, SIGMETRICS '09.

[9]  Ren-Shuo Liu,et al.  VST: A virtual stress testing framework for discovering bugs in SSD flash-translation layers , 2017, 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[10]  Dongkun Shin,et al.  Performance analysis of SSD write using TRIM in NTFS and EXT4 , 2011, 2011 6th International Conference on Computer Sciences and Convergence Information Technology (ICCIT).

[11]  Rina Panigrahy,et al.  Design Tradeoffs for SSD Performance , 2008, USENIX ATC.

[12]  Liang Shi,et al.  Towards trustable storage using SSDs with proprietary FTL , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[13]  Karl Pearson F.R.S. LIII. On lines and planes of closest fit to systems of points in space , 1901 .

[14]  Richard Boddington,et al.  Solid State Drives: The Beginning of the End for Current Practice in Digital Forensic Recovery? , 2010 .

[15]  Stefano Zanero,et al.  A comprehensive black-box methodology for testing the forensic characteristics of solid-state drives , 2013, ACSAC.

[16]  Jun Yan,et al.  Accurate and Low-Overhead Process-Level Energy Estimation for Modern Hard Disk Drives , 2013, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.

[17]  Alexander S. Szalay,et al.  Performance modeling and analysis of flash-based storage devices , 2011, 2011 IEEE 27th Symposium on Mass Storage Systems and Technologies (MSST).

[18]  Christof Paar,et al.  Detecting Software Theft in Embedded Systems: A Side-Channel Approach , 2012, IEEE Transactions on Information Forensics and Security.

[19]  V. Cruz Machado,et al.  Identifying vulnerabilities in the supply chain , 2009, 2009 IEEE International Conference on Industrial Engineering and Engineering Management.

[20]  Mircea R. Stan,et al.  FlashPower: A detailed power model for NAND flash memory , 2010, 2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010).

[21]  C. Steger,et al.  Energy Consumption Measurement Technique for Automatic Instruction Set Characterization of Embedded Processors , 2007, 2007 IEEE Instrumentation & Measurement Technology Conference IMTC 2007.

[22]  Henry L. Owen,et al.  Detecting and categorizing kernel-level rootkits to aid future detection , 2006, IEEE Security & Privacy Magazine.

[23]  Jongmoo Choi,et al.  VSSIM: Virtual machine based SSD simulator , 2013, 2013 IEEE 29th Symposium on Mass Storage Systems and Technologies (MSST).

[24]  Marcin Wójcik,et al.  Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests , 2013, ASIACRYPT.

[25]  P. Welch The use of fast Fourier transform for the estimation of power spectra: A method based on time averaging over short, modified periodograms , 1967 .

[26]  Alexander Chatzigeorgiou,et al.  Energy Consumption Estimation in Embedded Systems , 2006, IMTC 2006.

[27]  Steven Swanson,et al.  Reliably Erasing Data from Flash-Based Solid State Drives , 2011, FAST.

[28]  Hau T. Ngo,et al.  Inferring read and write operations of solid-state drives based on energy consumption , 2016, 2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON).

[29]  Farinaz Koushanfar,et al.  A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.

[30]  Wenyuan Xu,et al.  WattsUpDoc: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices , 2013, HealthTech.

[31]  Dhruva Acharyya,et al.  Detecting Trojans Through Leakage Current Analysis Using Multiple Supply Pad ${I}_{\rm DDQ}$s , 2010, IEEE Transactions on Information Forensics and Security.

[32]  Euiseong Seo,et al.  Empirical Analysis on Energy Efficiency of Flash-based SSDs , 2008, HotPower.

[33]  H. Howie Huang,et al.  Black-Box Performance Modeling for Solid-State Drives , 2010, 2010 IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.

[34]  Qiyou Xie,et al.  A new method for SSD black-box performance test , 2017, 2017 Progress In Electromagnetics Research Symposium - Spring (PIERS).

[35]  Alireza Ejlali,et al.  An Accurate Instruction-Level Energy Estimation Model and Tool for Embedded Systems , 2013, IEEE Transactions on Instrumentation and Measurement.

[36]  Robert Tibshirani,et al.  The Elements of Statistical Learning: Data Mining, Inference, and Prediction, 2nd Edition , 2001, Springer Series in Statistics.

[37]  Theodore Laopoulos,et al.  Energy Consumption Estimation in Embedded Systems , 2006, IEEE Transactions on Instrumentation and Measurement.