Forensic limbo: Towards subverting hard disk firmware bootkits

2017; Elsevier BV; Volume: 23; Linguagem: Inglês

10.1016/j.diin.2017.10.003

ISSN

1873-202X

Autores

Michael Gruhn,

Tópico(s)

Security and Verification in Computing

Resumo

We discuss the problem posed by malicious hard disk firmware towards forensic data acquisition. To this end, we analyzed the Western Digital WD3200AAKX model series (16 different drives) in depth and outline methods for detection and subversion of current state of the art bootkits possibly located in these particular hard disks' EEPROMs. We further extend our analysis to a total of 23 different hard drive models (16 HDDs and 7 SSDs) from 10 different vendors and provide a theoretical discussion on how hard disk rootkits residing in the firmware overlays and/or modules stored in the special storage area on a HDD called the Service Area could be detected. To this end, we outline the various debug interfacing possibilities of the various hard disk drives and how they can be used to perform a live analysis of the hard disk controller, such as dumping its memory over JTAG or UART, or how to access the Service Area via vendor specific commands over SATA.

Referência(s)
Altmetric
PlumX