固態(tài)硬盤(Solid State drives,SSD)使計(jì)算機(jī)取證原則發(fā)生了巨大變化。配備有固態(tài)硬盤的計(jì)算機(jī)與配備傳統(tǒng)磁盤的計(jì)算機(jī)在取證方式上有很大不同。嫌疑人試圖銷毀的信息不再具有高度可恢復(fù)性,目前取而代之的是取證工作陷入了無規(guī)律可循的僵局和無法預(yù)期的取證工作,深水區(qū),即——隨機(jī)取證。
為了緩解此問題,一些固態(tài)硬盤制造商對(duì)ATA ANSI規(guī)范進(jìn)行了擴(kuò)展,以實(shí)現(xiàn)安全銷毀閃存芯片上存儲(chǔ)的信息[5]。當(dāng) ATA 安全擦除(SE)命令[4]正確執(zhí)行時(shí),將在硬件層面擦除硬盤的全部內(nèi)容。
為了緩解這個(gè)問題,固態(tài)硬盤設(shè)計(jì)人員開發(fā)了一個(gè)接口,允許操作系統(tǒng)(例如Windows, Linux, Mac OS X等)通過TRIM命令[6]通知主控某些塊不再使用。這將允許內(nèi)部垃圾回收器以電子方式擦除這些塊的內(nèi)容,為將來的寫操作做好準(zhǔn)備。
[1] Solid State Drives: The Beginning of the End for Current Practice in Digital Forensic Recovery? http://www.jdfsl.org/subscriptions/JDFSL-V5N3-Bell.pdf
[4] Reliably Erasing Data From Flash-Based Solid State Drives http://www.usenix.org/events/fast11/tech/full_papers/Wei.pdf
[5] SSD Data Wiping: Sanitize or Secure Erase SSDs? http://www.kingston.com/us/community/articletype/articleview/articleid/202/ssd-data-wiping-sanitize-or-secure-erase-ssds.aspx
[6] TRIM http://en.wikipedia.org/wiki/TRIM
[7] Modern SSDs self-destroy court evidence http://www.ssdfreaks.com/content/612/modern-ssds-self-destroy-court-evidence
[8] Retrieving Digital Evidence: Methods, Techniques and Issues https://belkasoft.com/en/retrieving-digital-evidence-methods-techniques-and-issues
[9] Belkasoft Evidence Center 2012 Help: Carving https://belkasoft.com/en/bec/en/Carving.asp
[10] Intel SSD, TRIM support http://www.intel.com/support/ssdc/hpssd/sb/CS-031846.htm
[11] Recovering Information from SSD Drives: Myths and Reality http://hetmanrecovery.com/recovery_news/vosstanovlenie-informacii-s-ssd-nakopit.htm
[12] Solid state drives and forensic troubles http://tech.wiredpig.us/post/12292126487/solid-state-drives-and-forensic-troubles
[13] Intel 320-series SSD and FDE (Full Disk Encryption) questions... http://communities.intel.com/thread/20537