Skip to main content

A speed benefit in solid-state disk design opens them up for attack

ssd design contains data corruption vulnerability ps4 pro how to7
Image used with permission by copyright holder
Solid-state disks (SSDs) offer some serious benefits over their older hard-disk drive (HDD) siblings. SSDs are faster by orders of magnitude than HDDs, and they’re fundamentally more reliable — particularly for mobile devices where moving parts can be affected by movement and drops.

As SSD pricing has dropped from being significantly more expensive than HDDs to only a little more expensive, the price-to-performance ratio has improved to where SSDs have become by far the preferred storage device. However, some new information suggests that SSDs aren’t perfect and bring a unique vulnerability to particular kinds of attacks, as ExtremeTech reports.

The details are complex and require digging into the details of how SSDs are designed and how they work. Researchers at Carnegie Mellon University were the first to uncover the flaw, and their findings are covered in copious technical detail in a recently published paper.

In simpler terms, the vulnerability affects particular kinds of SSDs that are based on multilevel cell (MLC) technology, which make up the majority of those currently being sold and developed. The vulnerability in question does not affect older single-level cell (SLC) devices. The most advanced 3D NAND flash used in some SSDs are not affected yet but could be affected in future designs.

The vulnerability leverages a design quality of MLC-based SSDs that actually confers some benefits, including lower latency and better performance. The problem stems from the fact that data is written into a buffer directly from the individual flash cell that’s going to be written and not from the SSD’s flash controller.

Again, it’s all very technical, but basically, data can be corrupted by an attacker introducing interference and introducing errors during the programming process. That can result in corrupted data and actual damage to an SSD.

The solution would be to buffer data into the SSD flash controller and allow the controller to correct errors. The problem with this response is that it would also increase latency by around 5 percent and thus reduce performance — something that manufacturers might not be quick to do in the consumer market in particular given the important of raw speed to selling SSDs.

In any event, there’s something else to worry about to go along with the waves of malware and ransomware attacks we’ve seen lately. Our SSDs aren’t as safe as we thought they were, and that’s all we needed.

Mark Coppock
Mark has been a geek since MS-DOS gave way to Windows and the PalmPilot was a thing. He’s translated his love for…
A dangerous new jailbreak for AI chatbots was just discovered
the side of a Microsoft building

Microsoft has released more details about a troubling new generative AI jailbreak technique it has discovered, called "Skeleton Key." Using this prompt injection method, malicious users can effectively bypass a chatbot's safety guardrails, the security features that keeps ChatGPT from going full Taye.

Skeleton Key is an example of a prompt injection or prompt engineering attack. It's a multi-turn strategy designed to essentially convince an AI model to ignore its ingrained safety guardrails, "[causing] the system to violate its operators’ policies, make decisions unduly influenced by a user, or execute malicious instructions," Mark Russinovich, CTO of Microsoft Azure, wrote in the announcement.

Read more