• Guest
HabraHabr
  • Main
  • Users

  • Development
    • Programming
    • Information Security
    • Website development
    • JavaScript
    • Game development
    • Open source
    • Developed for Android
    • Machine learning
    • Abnormal programming
    • Java
    • Python
    • Development of mobile applications
    • Analysis and design of systems
    • .NET
    • Mathematics
    • Algorithms
    • C#
    • System Programming
    • C++
    • C
    • Go
    • PHP
    • Reverse engineering
    • Assembler
    • Development under Linux
    • Big Data
    • Rust
    • Cryptography
    • Entertaining problems
    • Testing of IT systems
    • Testing Web Services
    • HTML
    • Programming microcontrollers
    • API
    • High performance
    • Developed for iOS
    • CSS
    • Industrial Programming
    • Development under Windows
    • Image processing
    • Compilers
    • FPGA
    • Professional literature
    • OpenStreetMap
    • Google Chrome
    • Data Mining
    • PostgreSQL
    • Development of robotics
    • Visualization of data
    • Angular
    • ReactJS
    • Search technologies
    • Debugging
    • Test mobile applications
    • Browsers
    • Designing and refactoring
    • IT Standards
    • Solidity
    • Node.JS
    • Git
    • LaTeX
    • SQL
    • Haskell
    • Unreal Engine
    • Unity3D
    • Development for the Internet of things
    • Functional Programming
    • Amazon Web Services
    • Google Cloud Platform
    • Development under AR and VR
    • Assembly systems
    • Version control systems
    • Kotlin
    • R
    • CAD/CAM
    • Customer Optimization
    • Development of communication systems
    • Microsoft Azure
    • Perfect code
    • Atlassian
    • Visual Studio
    • NoSQL
    • Yii
    • Mono и Moonlight
    • Parallel Programming
    • Asterisk
    • Yandex API
    • WordPress
    • Sports programming
    • Lua
    • Microsoft SQL Server
    • Payment systems
    • TypeScript
    • Scala
    • Google API
    • Development of data transmission systems
    • XML
    • Regular expressions
    • Development under Tizen
    • Swift
    • MySQL
    • Geoinformation services
    • Global Positioning Systems
    • Qt
    • Dart
    • Django
    • Development for Office 365
    • Erlang/OTP
    • GPGPU
    • Eclipse
    • Maps API
    • Testing games
    • Browser Extensions
    • 1C-Bitrix
    • Development under e-commerce
    • Xamarin
    • Xcode
    • Development under Windows Phone
    • Semantics
    • CMS
    • VueJS
    • GitHub
    • Open data
    • Sphinx
    • Ruby on Rails
    • Ruby
    • Symfony
    • Drupal
    • Messaging Systems
    • CTF
    • SaaS / S+S
    • SharePoint
    • jQuery
    • Puppet
    • Firefox
    • Elm
    • MODX
    • Billing systems
    • Graphical shells
    • Kodobred
    • MongoDB
    • SCADA
    • Hadoop
    • Gradle
    • Clojure
    • F#
    • CoffeeScript
    • Matlab
    • Phalcon
    • Development under Sailfish OS
    • Magento
    • Elixir/Phoenix
    • Microsoft Edge
    • Layout of letters
    • Development for OS X
    • Forth
    • Smalltalk
    • Julia
    • Laravel
    • WebGL
    • Meteor.JS
    • Firebird/Interbase
    • SQLite
    • D
    • Mesh-networks
    • I2P
    • Derby.js
    • Emacs
    • Development under Bada
    • Mercurial
    • UML Design
    • Objective C
    • Fortran
    • Cocoa
    • Cobol
    • Apache Flex
    • Action Script
    • Joomla
    • IIS
    • Twitter API
    • Vkontakte API
    • Facebook API
    • Microsoft Access
    • PDF
    • Prolog
    • GTK+
    • LabVIEW
    • Brainfuck
    • Cubrid
    • Canvas
    • Doctrine ORM
    • Google App Engine
    • Twisted
    • XSLT
    • TDD
    • Small Basic
    • Kohana
    • Development for Java ME
    • LiveStreet
    • MooTools
    • Adobe Flash
    • GreaseMonkey
    • INFOLUST
    • Groovy & Grails
    • Lisp
    • Delphi
    • Zend Framework
    • ExtJS / Sencha Library
    • Internet Explorer
    • CodeIgniter
    • Silverlight
    • Google Web Toolkit
    • CakePHP
    • Safari
    • Opera
    • Microformats
    • Ajax
    • VIM
  • Administration
    • System administration
    • IT Infrastructure
    • *nix
    • Network technologies
    • DevOps
    • Server Administration
    • Cloud computing
    • Configuring Linux
    • Wireless technologies
    • Virtualization
    • Hosting
    • Data storage
    • Decentralized networks
    • Database Administration
    • Data Warehousing
    • Communication standards
    • PowerShell
    • Backup
    • Cisco
    • Nginx
    • Antivirus protection
    • DNS
    • Server Optimization
    • Data recovery
    • Apache
    • Spam and antispam
    • Data Compression
    • SAN
    • IPv6
    • Fidonet
    • IPTV
    • Shells
    • Administering domain names
  • Design
    • Interfaces
    • Web design
    • Working with sound
    • Usability
    • Graphic design
    • Design Games
    • Mobile App Design
    • Working with 3D-graphics
    • Typography
    • Working with video
    • Work with vector graphics
    • Accessibility
    • Prototyping
    • CGI (graphics)
    • Computer Animation
    • Working with icons
  • Control
    • Careers in the IT industry
    • Project management
    • Development Management
    • Personnel Management
    • Product Management
    • Start-up development
    • Managing the community
    • Service Desk
    • GTD
    • IT Terminology
    • Agile
    • Business Models
    • Legislation and IT-business
    • Sales management
    • CRM-systems
    • Product localization
    • ECM / EDS
    • Freelance
    • Venture investments
    • ERP-systems
    • Help Desk Software
    • Media management
    • Patenting
    • E-commerce management
    • Creative Commons
  • Marketing
    • Conferences
    • Promotion of games
    • Internet Marketing
    • Search Engine Optimization
    • Web Analytics
    • Monetize Web services
    • Content marketing
    • Monetization of IT systems
    • Monetize mobile apps
    • Mobile App Analytics
    • Growth Hacking
    • Branding
    • Monetize Games
    • Display ads
    • Contextual advertising
    • Increase Conversion Rate
  • Sundry
    • Reading room
    • Educational process in IT
    • Research and forecasts in IT
    • Finance in IT
    • Hakatonas
    • IT emigration
    • Education abroad
    • Lumber room
    • I'm on my way

SSD vulnerabilities with hardware encryption allow attackers to easily circumvent defensive measures

SSD vulnerabilities with hardware encryption allow attackers to easily circumvent defensive measures 3r380.  
3r380.  
Researchers at the University of Radboud (Netherlands) 3r34343. told r3r377. about vulnerabilities in the protection system of some solid-state drives. They allow an attacker to bypass the disk encryption function and access information on the disk without having to know the access password. 3r380.  
3r380.  
True, the voiced problem concerns only those SSD models that support hardware encryption due to the presence of an embedded chip that is separate from the main module. 3r380.  
The problem is 3r377. that there is a way to access data without a password at all - you need to use a vulnerability in the SED firmware. Vulnerabilities of this kind affect the specifications "3r3-3327. ATA security " And " TCG Opal ". 3r380.  
3r380.  
The main problem is that in addition to the access passwords that are specified by the owners of the SSD, there is also a master password, which is set in the factory. If you change this password, the vulnerability in question is eliminated, if not, the SSD and its data are open to attackers - of course, those who know exactly what to do. 3r380.  
3r380.  
But there is also a snag: the fact is that as a result of the flaws of the manufacturers of such devices, the encryption password chosen by the user and the DEK encryption key are not cryptographically linked. In other words, an attacker can find out the DEK value (the necessary data is hidden inside the SED chip) and then use it to decrypt the data without having to know the user-defined password. 3r380.  
3r380.  
“The lack of a cryptographic bundle is a catastrophe. Due to a flaw, user data is weakly protected. The data stored on the disk can be easily restored and copied, ”says one of the researchers who discovered the problem. The results of the research and the experts published their conclusions in the form of an article (download Here ). 3r380.  
3r380.  
Unfortunately, scientists were able to examine a small number of solid-state drives, their models are indicated below. However, all the studied devices were vulnerable. 3r380.  
3r380.  
3r380.  
3r380.  
The researchers studied both external and embedded SSD with hardware encryption support. In their opinion, a much more extensive range of such devices is subject to hacking. The study was completed in April of this year, until now scientists, together with the police of the Netherlands, tried to inform all manufacturers of the devices studied about the problem. 3r380.  
3r380.  
It is reported that companies such as Crucial (Micron) and Samsung have released a firmware update for solid-state drives, thus solving the problem. True, this may not be enough. 3r380.  
3r380.  
The fact is that researchers began to deepen their work, conducting a study of the security of user data of different systems. Windows users are most at risk because in this OS some services exacerbate the problem. So, the problem can be called Windows BitLocker, a software-based system for encrypting data on a disk running in the Windows OS environment. 3r380.  
3r380.  
As soon as BitLocker detects SSD with hardware encryption, the service is disabled, and the data is not encrypted by Windows, the OS "hopes" for hardware support. So, users who are still working with SSD Сracial and Samsung and have not updated the firmware of their drives, in fact, keep their data open to all. 3r380.  
3r380.  
The good news is that BitLocker can still be made to work in this case; to do this, you need to change some of the settings for
Group Policy 3r377. . But in this case, you need to format the drive and start working with it from scratch. 3r380.  
3r380.  
But in this case, the protection is double and there are no particular problems. According to the researchers who discovered the problem, its root is in the specifications created by the developers of hardware encryption. 3r388.
! function (e) {function t (t, n) {if (! (n in e)) {for (var r, a = e.document, i = a.scripts, o = i.length; o-- ;) if (-1! == i[o].src.indexOf (t)) {r = i[o]; break} if (! r) {r = a.createElement ("script"), r.type = "text /jаvascript", r.async =! ? r.defer =! ? r.src = t, r.charset = "UTF-8"; var d = function () {var e = a.getElementsByTagName ("script")[0]; e. ): d ()}}} t ("//mediator.mail.ru/script/2820404/"""_mediator") () (); 3r3386.
3r388.

It may be interesting

  • Comments
  • About article
  • Similar news
This publication has no comments.

weber

Author

6-11-2018, 20:23

Publication Date

Development / Information Security

Category
  • Comments: 0
  • Views: 277
Sberbank - you have a “package wrapper”
Transparent solar panels - a new
Robotaxy Waymo One earned as a
Security Week 45: Something About
Convert XLS files to Google Spreadsheet
Algorithm: How to find the next
Write a comment
Name:*
E-Mail:


Comments
nice post, keep up with this interesting work. It really is good to know that this topic is being covered also on this web site so cheers for taking time to discuss this!  https://l23movies.club/
Today, 15:35

Legend SEO

Extremely helpful post. This is my first time i visit here. I discovered such a large number of intriguing stuff in your blog particularly its exchange. Truly its extraordinary article. Keep it up.먹튀검증사이트

Today, 14:34

raymond weber

Thanks for taking the time to discuss this, I feel strongly about it and love learning more on this topic. If possible, as you gain expertise, would you mind updating your blog with extra information? It is extremely helpful for me.  pigmentvlekken verwijderen - dermasensation.nl
Today, 14:25

jacksonseo

Bangalore Escorts provides escort call girls by the escort agency in Bangalore. We have selected the best high profile call girls in Bangalore. Visit us www.piyagupta.com/
South Bangalore  Escorts || Marathahalli Escorts || Electronic City Escorts || Hebbal Escorts || Mg road Escorts || Ulsoor Escorts || Ub city Escorts || Nandi hills Escorts || Malleswaram Escorts || Commercial street  Escorts || Indira nagar Escorts || Hsr layout Escorts

Today, 12:24

piyagupta01

I have read your article, it is very informative and helpful for me. I admire the valuable information you offer in your articles. Thanks for posting it .. also visit 
Today, 11:27

Legend SEO

Adv
Website for web developers. New scripts, best ideas, programming tips. How to write a script for you here, we have a lot of information about various programming languages. You are a webmaster or a beginner programmer, it does not matter, useful articles will help to make your favorite business faster.

Login

Registration Forgot password