Over-provisioning technology is typically introduced as a means to improve the performance of storage systems, such as databases. The over-provisioning area is both hidden and difficult for normal users to access. This paper focuses on attack models for such hidden areas. Malicious hackers use advanced over-provisioning techniques that vary capacity according to workload, and as such, our focus is on attack models that use variable over-provisioning technology. According to these attack models, it is possible to scan for invalid blocks containing original data or malware code that is hidden in the over-provisioning area. In this paper, we outline the different forensic processes performed for each memory cell type of the over-provisioning area and disclose security enhancement techniques that increase immunity to these attack models. This leads to a discussion of forensic possibilities and countermeasures for SSDs that can change the over-provisioning area. We also present information-hiding attacks and information-exposing attacks on the invalidation area of the SSD. Our research provides a good foundation upon which the performance and security of SSD-based databases can be further improved.
翻译:过度供应技术通常是用来改进储存系统(如数据库)性能的手段,例如数据库; 过度供应地区既隐蔽,又难以让正常用户进入; 本文侧重于这类隐蔽地区的攻击模式; 恶意黑客使用先进的过度供应技术,其工作量不同,因此,我们的重点是使用多供应技术的进攻模式; 根据这些攻击模式,可以扫描含有在过度供应地区隐藏的原始数据或恶意软件代码的无效区块; 在本文中,我们概述了对过度供应地区每一类记忆细胞实施的不同法证程序,并披露了提高这些攻击模式豁免程度的安全加强技术。这导致讨论特殊安全开发公司的法证可能性和对策,这些技术可以改变过度供应地区。 我们还介绍了对特殊安全开发领域无效性进行的信息干扰攻击和信息扩展攻击。 我们的研究提供了一个良好的基础,可以据此进一步改进基于特殊供应标准的数据库的性能和安全性。