Feature: Memory
Table 1: Features of the FerriSSD BGA SSD solutions
Module to get credentials to authorise decryption of the drive upon power-up. Interactions are accomplished with AT commands or, more typically, commands defined by the Trusted Computing Group (TCG) Opal standard. Microsoſt Bitlocker as well as managing soſtware- based encryption can manage hardware- encrypted SEDs using Opal with additional protocols and interface specifications. Tere are also proprietary approaches
to SED control. Unlike the soſtware- based approach, the SED is encrypted or decrypted instantaneously and there is no processing load on the main system CPU. When retrieved from the disk, data is decrypted locally and transferred unencrypted across the PCIe/SATA interface into the computer. In mobile and portable equipment, the greater efficiency of this hardware-based approach can help to improve energy utilisation and extend battery life. Silicon Motion’s FerriSSD drives
implement hardware encryption according to the latest TCG standard, Opal 2.0. Full-disk encryption uses AES-256 cryptography – the industry-standard 256-bit cryptographic algorithm used by government agencies, financial institutions and the military, for its excellent resistance to brute-force attacks. However, encryption alone can’t provide
comprehensive protection against all possible attacks.
Protection with digital signature Other common attacks include attempts to take control of the SSD by loading malicious firmware. Tis could be used to force the disk to decrypt the stored content, exposing sensitive data, or to activate ransomware. To prevent this type of attack, FerriSSDs
implement authenticated firmware protection that requires a secure digital signature to be presented at system boot. Te signature is implemented using eFuse; see Figure 2. Te eFuse is inaccessible and contains unique passwords that prevent unauthorised firmware from completing the signature verification process needed to start the FerriSSD. Failure to verify the signature causes the system to send a security warning to the host processor. Te secure digital signature also allows
firmware updates to be applied remotely to FerriSSD units.
Data preservation FerriSSDs offer storage capacity of up to 1TB and are housed in a 16mm x 20mm surface-mount BGA package; see Figure 3 for the range of packaging options and Table 1 for the features. Tis card or motherboard can be mounted near the host processor, within the main device enclosure, ensuring greater protection against physical tampering than a conventional external SSD. In the hackers’ arsenal there’s an attack
38 February 2024
www.electronicsworld.co.uk
that spoofs emergency unscheduled maintenance; however, FerriSSD can detect this type of activity, sending an alert to the host processor. In addition, all FerriSSDs support a
Secured Quick Erase function, which can instantly delete all data if interference is detected. A module pin is also provided to trigger a data-flush sequence that safely stores user data during an unexpected event, such as a sudden power failure. Te SSD provides power-efficient,
compact and high-performing mass storage that is also robust and suited to many industries, including medical, automotive and computing. Full-disk encryption using soſtware included in the main OS or hardware embedded in the disk itself is essential to keep stored data properly secure. Silicon Motion’s advanced FerriSSDs
rely on hardware-based encryption, which operates without adding to the load on the main system CPU and, therefore, increases performance, energy efficiency and battery lifetime in portable applications. To enhance and augment the protection provided by encryption and thus provide the most-effective security against today’s cyber threats, FerriSSDs use additional techniques, including firmware protection by digital signature, tamper detection and emergency erase in the event of severe physical attack.
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44