際際滷

際際滷Share a Scribd company logo
FORENSIC INSIGHT;
DIGITAL FORENSICS COMMUNITY IN KOREA
All about Physical Data Recovery
: How to recover overwritten data from magnetic disk
proneer
proneer@gmail.com
http://forensic-proof.com
JK Kim
forensicinsight.org Page 2
Outline
1. 一危 蠍磯 覦 (Data Recoding Mode)
2. 一危 語 蠍磯 (Data Encoding Techniques)
3. 一危  蠍磯 (Data Wiping Techniques)
4. 覓朱Μ 一危 覲糾規 螳レ (Probability of Physical Data Recovery)
forensicinsight.org Page 3
Data Recoding Mode
forensicinsight.org Page 4
Data Recoding Mode
 一危(Data) (pron.: /de肘t/ day-t or /d脱t/)
 the quantities, characters, or symbols on which operations are performed by a computer,
being stored and transmitted in the form of electrical signals and recorded on magnetic,
optical, or mechanical recording media  Wikipedia
 In computer science, data is anything in a form suitable for use with a computer  Wikipedia
蠍磯蓋 螳 (Basics)
forensicinsight.org Page 5
Data Recoding Mode
 蠍 蠍磯(Magnetic Recording)
 Hard Disk, Magnetic Tape, Magnetic Stripe Card, 
 蟯 蠍磯(Optical Recording)
 Compact Disk(CD), Digital Versatile Disk(DVD), 
  蠍磯(Electronic Recording)
 RAM, ROM, Flash Memory, 
ルГ豌 蠍磯 覦 (Storage Recoding Mode)
forensicinsight.org Page 6
Data Recoding Mode
 ろ 企
ろ 殊企 (HDD)
http://www.pcguide.com/ref/hdd/index.htm
forensicinsight.org Page 7
Data Recoding Mode
 譯殊 蟲 
ろ 殊企 (HDD)
http://www.pcguide.com/ref/hdd/op/index.htm
forensicinsight.org Page 8
Data Recoding Mode
 讌 一危 所鍵/郁鍵 豈
ろ 殊企 (HDD)
http://www.lintech.org/comp-per/07MAGREC.pdf
forensicinsight.org Page 9
Data Recoding Mode
 蠍一 伎  覓殊  讌蟲 覈 覓殊
 煙牡 覿襯
 螳煙牡(ferromagnetic substance) : 碁 螳 蠍一レ  , 蠏 蠍一 覦レ朱 螳
蟆   蠍一レ 殊碁 螳  覓殊 (豌, 貊覦, 貅 )
 覦煙牡(diamagnetic substance) : 碁 蠍一レ  蠍一リ骸 覦 覦レ朱  覓殊
(蠍螻 一襯 誤 蠍一牡, 覓 )
 煙牡(paramagnetic substance) : 蠍一レ 蠍一 覦レ朱 渚蟆 螻, 蠍
レ 蟇磯覃 讌  覓殊 (襭覩碁, 譯殊, 覦炎, 企Μ )
煙牡 (Magnetic Substance)
forensicinsight.org Page 10
Data Recoding Mode
 煙牡 轟 (Magnetic Material Characteristics)
  (Saturation) : 讌   蠍一 瑚鍵(H)襯 讀螳貅一   伎 讀螳
讌  
 襯 蠍(Retentivity, Remanence) : 蠍  襯 螳, 蠍一ルゼ 蟇壱
 煙牡  , 螳煙牡 襯 蠍郁 蠍  (蟲 )
 覲伎(Coercivity) : 襯 蠍磯ゼ 蠍 (0朱) 覦レ朱 螳伎  蠍一レ 瑚鍵
  覦(magnetic flux density) : 蠍一レ 蠍磯ゼ 企 蟆朱  覃伎 讌朱 讌
 蠍磯レ 
 蠍磯(magnetic force) :  蠏 伎  朱 襦 覦蟇磯 濠鍵 
煙牡 (Magnetic Substance)
http://www.lintech.org/comp-per/07MAGREC.pdf
forensicinsight.org Page 11
Data Recoding Mode
 蠍 企 螻′ (Hysteresis Loop), B-H 螻′
 ろ 蟆曙,  , 企, 郁鍵 覦 煙朱 誤   企ゴ讌 覈詩
 , 伎郁鍵 螳 語朱 誤 螳 郁鍵  襷 B-H 螻′ る
煙牡 (Magnetic Substance)
forensicinsight.org Page 12
Data Recoding Mode
 蠍 企 螻′ (Hysteresis Loop), B-H 螻′
煙牡 (Magnetic Substance)
forensicinsight.org Page 13
Data Recoding Mode
 (magnetization) vs. (magnetic flux)
 
 蠍一 伎 煙牡襯  , 企 煙牡 蠍磯ゼ 蟆  
 
  煙牡襯 糾骸  襦  豐  
煙牡 (Magnetic Substance)
forensicinsight.org Page 14
Data Recoding Mode
 0螻 1  覦覯  蠍磯  蠏轟煙 譟伎 (North, South)
 蠏(magnetic pole) 豸′ 伎 覦
 N 蠏( S 蠏) : 0
 S 蠏( N 蠏) : 1
  覦(flux reversal) 伎 覦
 S  N( N  S) : 0
 N  S( S  N) : 1
  蠏轟煙   覦 豸′ 覦朱 覦  ???????
一危 蠍磯 (Data Recording)
forensicinsight.org Page 15
Data Recoding Mode
  覦  伎
 (Field) vs. 覦(Reversal)
 螳  螳(蠏轟)覲企 覦 豸′蠍郁  
 覦 蠍一 襦 螳讌  朱 覲  る襯 伎 讌
 ろ 覦螳 讀螳 磯 螻 螳襯 讌   蠍一 瑚鍵 螻 螳
 蠍壱(Synchronization)
 螳 觜語 螻  企瑚?
 一 0 1,000螳  蠍磯 蟆曙  SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS..
  蟲覿(Field Separation)
 狩 一危(一 0轟 1)螳 蠍磯 蟆曙,   蠍一 
 螳  蟲覿   豢螳  蟲覿螳 
一危 蠍磯 (Data Recording)
forensicinsight.org Page 16
Data Recoding Mode
 一危 蠍磯 磯ジ 一危,  ,  襴, 所鍵 
 煙牡 碁 螻襯 螳覃 轟 覦レ朱 
  覦  一危磯ゼ 蟲覿 企 蠍壱(clock synchronization)
 企 蠍壱   覦 企至 譴企?  語 蠍磯 覦
一危 蠍磯 (Data Recording)
forensicinsight.org Page 17
Data Encoding Techniques
forensicinsight.org Page 18
Data Encoding Techniques
 れ 蠍磯
 RZ (Return to Zero)
 NRZ (Non-Return to Zero)
 NRZI (Non-Return to Zero, Invert)
 PM (Phase Modulation)
 FM (Frequency Modulation)
 MFM (Modified FM)
 MMFM (Modified MFM)
語 蠍磯 (Encoding Techniques)
http://www.lintech.org/comp-per/07MAGREC.pdf
forensicinsight.org Page 19
Data Encoding Techniques
 譯狩 覲譟 (0 觜 1  覦一 覦 襯 螳讌)
 0 :  覦 れ  覦 X
 1 : 一 2螳  覦
 1970 襷~1980 豐 襦 ろ    MFM朱 覲蟆
 企  豢螳  覦朱 誤 觜螳 襷れ 
* N : No flus reversal, R : flux Reversal
FM (Frequency Modulation)
Bit Pattern
Encoding
Pattern
Flux Reversals
Per Bit
Bit Pattern Commonality In
Random Bit Stream
0 RN 1 50%
1 RR 2 50%
Weighted Average 1.5 100%
forensicinsight.org Page 20
Data Encoding Techniques
 覲 譯狩 覲譟
 企   覦 襯 譴 FM レ  一 0 襷  覦 
 螻襴讀, 語/貊 襦 覲旧  伎姶 貉碁,螳  殊企
 襦 ろ 豐蠍 ろ   蟾讌 襦 ろ 譴
MFM (Modified Frequency Modulation)
Bit Pattern
Encoding
Pattern
Flux Reversals
Per Bit
Bit Pattern Commonality In
Random Bit Stream
0 (preceded by 0) RN 1 25%
0 (preceded by 1) NN 0 25%
1 NR 1 50%
Weighted Average 0.75 100%
forensicinsight.org Page 21
Data Encoding Techniques
  蠍語 
  觜碁ゼ 語  蟆  覈 觜碁ゼ 覓苦 伎朱 蠍磯  企/ 覦 狩
  蠍語(Run Length) :  覦 伎 豕 螳蟆
  (Run Limited) :  覦 伎 豕 螳蟆
 れ 覲 譟伎  RLL (1,7), RLL (2,7)
RLL (Run Length Limited) (contd)
forensicinsight.org Page 22
Data Encoding Techniques
 RLL (2, 7)
 RLL 煙レ朱 ろ レ MFM RLLL襦 蟲豌
 襦 ろ  MFM 
RLL (Run Length Limited)
Bit Pattern
Encoding
Pattern
Flux Reversals
Per Bit
Bit Pattern Commonality In
Random Bit Stream
11 RNNN 1/2 25%
10 NRNN 1/2 25%
011 NNRNNN 1/3 12.5%
010 RNNRNN 2/3 12.5%
000 NNNRNN 1/3 12.5%
0010 NNRNNRNN 2/4 6.25%
0011 NNNNRNNN 1/3 6.25%
Weighted Average 0.4635 100%
forensicinsight.org Page 23
Data Encoding Techniques
 豕豺 蟆豢 (Peak Detection)
 RLL 語 豕豺 蟆豢 覦
PRML (Partial Response, Maximum Likelihood) (contd)
forensicinsight.org Page 24
Data Encoding Techniques
 豕豺 蟆豢 螻
 覦郁化 ′覲企 豕豺螳 豢覿  蟆曙  
 蠍磯 覦 讀螳襦  覦 豕豺 襦  覦蟆 豺  螳 覦
 螳 譴願 蠍一 瑚鍵襯 譴  豕豺 蟆豢 企れ
 企れ 願屋螻 煙ロ 蟆 PRML (覿覿 , 豕 )
 PRML RLL 觜 30~40% 蠍磯覦襯 讀螳
PRML (Partial Response, Maximum Likelihood) (contd)
forensicinsight.org Page 25
Data Encoding Techniques
 覿覿 , 豕 
 一危 襷 (覿覿 )  螳   讌 (豕 )
PRML (Partial Response, Maximum Likelihood)
forensicinsight.org Page 26
Probability of Physical Data Recovery
MFM vs. PRML
forensicinsight.org Page 27
Data Encoding Techniques
  PRML
  螻殊 螻襴讀螻 豌襴 襦襯    蟆 伎
 る 覦襯 讀螳  PRML 觜  20%~70%蟾讌 蠍磯 覦 讀螳
  ろ 覈 EPRML 語 覦 
EPRML (Extended PRML)
forensicinsight.org Page 28
Data Wiping Techniques
forensicinsight.org Page 29
Data Wiping Techniques
 伎郁鍵 (Overwriting)
 螻  一危一 豺 [0, 1,  ,  一危]襯 伎
 誤 (Encryption)
  覦 伎 ろ 轟  誤
 螳一(Degaussing)
 螳ロ 蠍一レ 伎 蠍磯ろ 覃伎  襴 蟯
 覓朱Μ 蟯, 豌螻, (Physical Destruction)
 螳ロ 蠍郁襯  覓朱Μ朱 蟲覃 願碓 
 覦 (Wiping/Sanitization/Secure Erase/Destruction Methods)
forensicinsight.org Page 30
Data Wiping Techniques
螳一 vs. 覓朱Μ蟯
forensicinsight.org Page 31
Data Wiping Techniques
 http://en.wikipedia.org/wiki/Data_erasure
伎郁鍵 蠍磯 危 譴 (Standard Overwritten Techniques)
譴  覦覲  觜螻
U.S. Navy 1993 3 覓語, 覲伎,  蟆讀 
U.S. Air Force 1996 4 0, 1, 覓語 蟆讀 
Peter Gutmann 1996 1-35 襷れ れ   讌  MFM, RLL 
Bruce Schneier 1996 7 0, 1, 5覯  
U.S. DoD 2001 3 覓語, 覲伎, るジ 
German Federal 2004 2-3 覿蠏豺 , 覲伎
CSEC 2006 3 0(1), 覲伎 覿襯讌  襷れ牡襯 
NIST 2006 1 ?
U.S. NISP 2006 ? ?  伎 讌讌 
NSA/CSS 2007 0 ? 螳一  蟯
Australian 2008 1 ? 螳一  手 觜覦 襷れ牡 蟯
New Zealand 2008 1 ? 蠍磯 一危磯ゼ
forensicinsight.org Page 32
Data Wiping Techniques
 ろ  危
 覓朱Μ 麹 ~襷讌襷 蟾讌 伎郁鍵
 觜 ,  螻糾 危
 HPA, DCO 螻
   危
     一危磯ゼ 蟆 危
  覃一危一 蟯 壱(襴豺, 讌ろ碁Μ ) 螻
 譴 危 蠍磯 讌  蟲 
伎郁鍵 覦 (Overwritten Methods)
forensicinsight.org Page 33
Data Wiping Techniques
 BCWipe (file, folder, free space, windows artifacts, file slack)
 Hardwipe (file, drive, space)
 Eraser (file, folder, free space, slack space)
 CCleaner (windows artifacts)
 File Shredder (file, folder)
 SDelete (file, folder, free space)
 Dariks Boot And Nuke (drive)
 dd (*nix) (file, drive)
  
危 蟲 (Wiping Tools)
forensicinsight.org Page 34
Probability of
Physical Data Recovery
forensicinsight.org Page 35
Probability of Physical Data Recovery
 Secure Deletion of Data from Magnetic and Solid-State Memory (1996)
 MFM(Magnetic Force Microscopy)襦 覲糾規 螳レ 瑚
 0 1 伎磯 0.95, 1 1 伎磯 1.05  螳 蠍磯  伎 一危 豢 螳
 蠍磯  郁鍵 る 豺 れ姶 覦  碁 螳レ襴  一危 蟾
 豕 35覯 伎郁鍵螳   MFM, (1,7) RLL, (2,7) RLL 覈 
 PRML 覦  ろ  一危磯ゼ 覈 覯襷 伎 豢覿
狩 蟲碁 朱 (Peter Gutmanns Paper)
forensicinsight.org Page 36
Probability of Physical Data Recovery
狩 蟲碁
伎郁鍵 一危
(Peter Gutmanns
Overwrite Data)
forensicinsight.org Page 37
Probability of Physical Data Recovery
 Overwriting Hard Drive Data: The Great Wiping Controversy (2008)
 覲糾規螳 覿螳ロ蟆 伎磯る 覈 覯 襯 伎 讌  朱 襷
 狩 蟲碁 朱 危 一危磯ゼ 覯襷 伎磯 覲糾規  る 朱 貉れ
 れ 危 覓 襷 螳 蟲
 企 朱 蟆讀螻 ろ 企  朱 覩瑚 讌?
 覈視 ろ
 1 蠍磯 , 0 伎磯 0.95, 1 伎磯 1.05 蠏殊る 豢 襷螳?
 螳 郁鍵    1 螳 磯 蟆 螳ロ螳?
 るジ 朱 (Another Paper)
forensicinsight.org Page 38
Probability of Physical Data Recovery
 MFM 蠍磯
 蠍磯レ   覃伎 螻糾 覲企ゼ 
 1 覦危碁ゼ 覲糾規 4覿 
 襦    覲
 碁 觜 螻
  伎
 ろ  蠍磯 螻 伎  谿
MFM (Magnetic Force Microscopy)
forensicinsight.org Page 39
Probability of Physical Data Recovery
  伎 覲
 蠍磯 伎 レ 覩語 
 る 讌  企朱 讌, 螻糾鍵 襴 覦    螻褐 豺?
   ろ  磯ジ 企 企 蠍磯 覲   螳 手覃 蠍磯レ 螳
    襷 貉危語  譴 覦 る
 蠍磯 伎 一危
 覲伎豈
  覲伎(Thermal Recalibration) 螻襴讀  ろ 豢/曙綾 磯ジ  谿 螳
 螻襴讀 螳, 企 覿 螳, 語 ろる 螳
 れ 碁レ 企 螻 襷 碁 語  狩 伎 蠍磯蠍磯 企れ
MFM (Magnetic Force Microscopy)
forensicinsight.org Page 40
Probability of Physical Data Recovery
 覦 覿 谿
 ろ 1 蠍磯 襷 蠍磯 襷  1 螳 蠍磯  螳?
  覲, 給, 讌, 螳 磯ジ 覿朱 誤 危 螻襷 覦 覿 る
 覩語誤 谿伎襷 螳 豸″蠍磯 企れ
覦 覿 (Distribution of Density)
forensicinsight.org Page 41
Probability of Physical Data Recovery
 覦 覿 谿
 1.06企朱 螳 詞 , 伎 螳 レ瑚?  レ瑚?   企れ
 螳 讌 磯 殊企 蠍一レ 覿 (渚伎?)
覦 覿 (Distribution of Density)
forensicinsight.org Page 42
Probability of Physical Data Recovery
 覲糾規 螳レ
 蟾 ろ  危 ろ 一危磯ゼ 覲糾規   螳レ煙 
 0.01% 覲企    
 螻  ろ(襷結 ろ ) 覲糾規   螳レ焔 
 螳レ煙 譬  讌襷 覩語 企ゼ 詞企 螳レ煙 
  覩瑚化 蠍一  覦る?
  覩瑚化  ろ 覲企  
  覩瑚化 蠍一 螻螳  ろ 蠍一 螻
覦 覿 (Distribution of Density)
forensicinsight.org Page 43
Probability of Physical Data Recovery
 ろ 貉碁,  豕 蠍磯
 ECC Error Detection : 麹 Servo  ル ECC 
 ECC Error Correction : ECC  讌  る  覦朱 覲糾規
 Automatic Retry : 螳る 讌企  覲襦  豺襯 覈 谿場 ,   
 Advanced Error Correction : 螻蠍   螻襴讀    襴
 Failure : 麹磯ゼ 曙  蟆曙, 襦 覲糾規螳 覿螳
 譟一襷 螻牛旧  豕 蠍磯    レ 譴企
  語 ろる(PRML, EPRML) 襦蠏 螳    蟲褐 覲伎豈
 蟆郁骸朱, 伎 螳 企 蟆 襯 蟆
 蟯襴 襦讌 (Read Error Severities and Error Management Logic)
forensicinsight.org Page 44
Probability of Physical Data Recovery
 豺危螻襴 A
 讌  蟾 ろ
 襷結 ろ (NTFS 蠍磯蓋 麹 蠍磯ゼ 伎 覯 襷)
 覡伎 殊企 (ろ 一危磯ゼ 32覯 伎郁鍵, /dev/random)  0朱 伎
 豺危螻襴 B
 豕豐 蠍磯螻 一 伎郁鍵 5螳讌  
 覈 0
 覈 1
 01010101 
 00111011 
 00001111 
ろ 一危一 覦覯 (Data and Method) (contd)
forensicinsight.org Page 45
Probability of Physical Data Recovery
 17螳  覈 
 る Quantum 1GB 2006 豢 覈瑚讌 (SCSI, IDE )
 56螳 ろ ろ
 ろ
1. 1KB 殊 伎 一危 蠍磯
2. 殊企 螻♀骸 觜碁 覈 曙
3. 76,800 一危 誤 覿  螳 谿襯 5覯 覦覲牛
  覿襯 伎 覯伎 襴(Bayes Theorem)襯 
 れ  覓伎  一危磯ゼ   
ろ 一危一 覦覯 (Data and Method)
forensicinsight.org Page 46
Probability of Physical Data Recovery
 る 殊企 覈語  襯 覿 企
 豐蠍 1 蠍磯 , 0朱 伎 (伎 )
覲糾規 螳レ (Probability of Recovery)
forensicinsight.org Page 47
Probability of Physical Data Recovery
 襦 殊企 覈語  襯 覿 企
 豐蠍 1 蠍磯 , 0朱 伎 (伎 )
 豢螳 伎郁鍵襯 1, 3  蟆郁骸 觜蟲
覲糾規 螳レ (Probability of Recovery)
forensicinsight.org Page 48
Probability of Physical Data Recovery
 襦 殊企 覈語  襯 覿 企
 螻覦 EPRML  殊企 覲糾規 襯 企 讌 襯螻 
 2006 覈 ろ
 覈 0朱 危 ろ 1 伎殊   豕 49.18%(+/- 0.11) 覲糾規 襯
 覈 0朱 危 ろ るジ   豕 36.08%(+/- 0.24) 覲糾規 襯
 朱朱  ろ 覲糾規 襯?
覲糾規 螳レ (Probability of Recovery)
forensicinsight.org Page 49
Probability of Physical Data Recovery
 覲糾規 一危 覿
 8 觜碁ゼ  曙 , 1襦 
覲糾規 螳レ (Probability of Recovery)
forensicinsight.org Page 50
Probability of Physical Data Recovery
  ろ
 ろ 一危
 覲糾規 蟆郁骸 (豕 覦覯)
覲糾規 螳レ (Probability of Recovery)
Secure deletion of data - Peter Gutmann - 1996
Abstract
With the use of increasingly sophisticated encryption systems, an attacker
wishing to gain access to sensitive data is forced to look elsewhere for information. One
avenue of attack is the recovery of supposedly erased data
from magnetic media or random-access memory.

cKr脱 }d8eti族nof0daI0Ptr0G則tW鱈誰_村1u960eb8t単utW00000D巽#0
Hf$00側000%贈z00達0000叩0叩辰束it|t綻0u続eFf尊i%|esinqTy淡樽op:iaze0
速Mcryption0s樽tems?DKtA""c0+蔵sin0toKai2z歎c(ns~0t端0;e
遜 iti)e""da a>s0fo担ce存t l2o
狸elI其$e旦e催r""inf測rmion.0OnR誰avem>egoN0-即tR"1i
l辰h賊0"eoie=y0Czsu即s/`l{eraJd0dataF即ro>magne続;&贈探達叩達%or*rndo捉-Qcc束展0m
@ryl00000000000000000
forensicinsight.org Page 51
Probability of Physical Data Recovery
 蟆郁骸朱
 螳覲 觜語 覲糾規 螳レ煙 讌襷 覩  一危磯 覲糾規 覿螳
 ろ 譟一 ろ  磯 谿 覦  譴蠍磯 企れ
 GB/TB 覲企ゼ 朱 蟆 蟲襯 螳覦 蟆 覿螳
 る 殊企 譟一姶 螳レ煙 
 覯 讀蟇磯 蠍一 覿
 伎 殊企 覲糾規 螳レ煙  朱 譬 螳 
覲糾規 螳レ (Probability of Recovery)
forensicinsight.org Page 52
Question and Answer
 谿瑚 襭 (Reference)
1. Peter Gutmann, Secure Deletion of Data from Magnetic and Solid-State Memory
2. Craig Wright, Dave Kleiman, Shyaam Sundhar R.S, Overwriting Hard Drive Data: The Great
Wiping Controversy
3. PC Guides Hard Disk Data Encoding and Decoding
(http://www.pcguide.com/ref/hdd/geom/data.htm)
4. Ian McLoughlin, Magnetic Recording Fundamentals
(http://www.lintech.org/comp-per/07MAGREC.pdf)

More Related Content

(130119) #fitalk all about physical data recovery

  • 1. FORENSIC INSIGHT; DIGITAL FORENSICS COMMUNITY IN KOREA All about Physical Data Recovery : How to recover overwritten data from magnetic disk proneer proneer@gmail.com http://forensic-proof.com JK Kim
  • 2. forensicinsight.org Page 2 Outline 1. 一危 蠍磯 覦 (Data Recoding Mode) 2. 一危 語 蠍磯 (Data Encoding Techniques) 3. 一危 蠍磯 (Data Wiping Techniques) 4. 覓朱Μ 一危 覲糾規 螳レ (Probability of Physical Data Recovery)
  • 4. forensicinsight.org Page 4 Data Recoding Mode 一危(Data) (pron.: /de肘t/ day-t or /d脱t/) the quantities, characters, or symbols on which operations are performed by a computer, being stored and transmitted in the form of electrical signals and recorded on magnetic, optical, or mechanical recording media Wikipedia In computer science, data is anything in a form suitable for use with a computer Wikipedia 蠍磯蓋 螳 (Basics)
  • 5. forensicinsight.org Page 5 Data Recoding Mode 蠍 蠍磯(Magnetic Recording) Hard Disk, Magnetic Tape, Magnetic Stripe Card, 蟯 蠍磯(Optical Recording) Compact Disk(CD), Digital Versatile Disk(DVD), 蠍磯(Electronic Recording) RAM, ROM, Flash Memory, ルГ豌 蠍磯 覦 (Storage Recoding Mode)
  • 6. forensicinsight.org Page 6 Data Recoding Mode ろ 企 ろ 殊企 (HDD) http://www.pcguide.com/ref/hdd/index.htm
  • 7. forensicinsight.org Page 7 Data Recoding Mode 譯殊 蟲 ろ 殊企 (HDD) http://www.pcguide.com/ref/hdd/op/index.htm
  • 8. forensicinsight.org Page 8 Data Recoding Mode 讌 一危 所鍵/郁鍵 豈 ろ 殊企 (HDD) http://www.lintech.org/comp-per/07MAGREC.pdf
  • 9. forensicinsight.org Page 9 Data Recoding Mode 蠍一 伎 覓殊 讌蟲 覈 覓殊 煙牡 覿襯 螳煙牡(ferromagnetic substance) : 碁 螳 蠍一レ , 蠏 蠍一 覦レ朱 螳 蟆 蠍一レ 殊碁 螳 覓殊 (豌, 貊覦, 貅 ) 覦煙牡(diamagnetic substance) : 碁 蠍一レ 蠍一リ骸 覦 覦レ朱 覓殊 (蠍螻 一襯 誤 蠍一牡, 覓 ) 煙牡(paramagnetic substance) : 蠍一レ 蠍一 覦レ朱 渚蟆 螻, 蠍 レ 蟇磯覃 讌 覓殊 (襭覩碁, 譯殊, 覦炎, 企Μ ) 煙牡 (Magnetic Substance)
  • 10. forensicinsight.org Page 10 Data Recoding Mode 煙牡 轟 (Magnetic Material Characteristics) (Saturation) : 讌 蠍一 瑚鍵(H)襯 讀螳貅一 伎 讀螳 讌 襯 蠍(Retentivity, Remanence) : 蠍 襯 螳, 蠍一ルゼ 蟇壱 煙牡 , 螳煙牡 襯 蠍郁 蠍 (蟲 ) 覲伎(Coercivity) : 襯 蠍磯ゼ 蠍 (0朱) 覦レ朱 螳伎 蠍一レ 瑚鍵 覦(magnetic flux density) : 蠍一レ 蠍磯ゼ 企 蟆朱 覃伎 讌朱 讌 蠍磯レ 蠍磯(magnetic force) : 蠏 伎 朱 襦 覦蟇磯 濠鍵 煙牡 (Magnetic Substance) http://www.lintech.org/comp-per/07MAGREC.pdf
  • 11. forensicinsight.org Page 11 Data Recoding Mode 蠍 企 螻′ (Hysteresis Loop), B-H 螻′ ろ 蟆曙, , 企, 郁鍵 覦 煙朱 誤 企ゴ讌 覈詩 , 伎郁鍵 螳 語朱 誤 螳 郁鍵 襷 B-H 螻′ る 煙牡 (Magnetic Substance)
  • 12. forensicinsight.org Page 12 Data Recoding Mode 蠍 企 螻′ (Hysteresis Loop), B-H 螻′ 煙牡 (Magnetic Substance)
  • 13. forensicinsight.org Page 13 Data Recoding Mode (magnetization) vs. (magnetic flux) 蠍一 伎 煙牡襯 , 企 煙牡 蠍磯ゼ 蟆 煙牡襯 糾骸 襦 豐 煙牡 (Magnetic Substance)
  • 14. forensicinsight.org Page 14 Data Recoding Mode 0螻 1 覦覯 蠍磯 蠏轟煙 譟伎 (North, South) 蠏(magnetic pole) 豸′ 伎 覦 N 蠏( S 蠏) : 0 S 蠏( N 蠏) : 1 覦(flux reversal) 伎 覦 S N( N S) : 0 N S( S N) : 1 蠏轟煙 覦 豸′ 覦朱 覦 ??????? 一危 蠍磯 (Data Recording)
  • 15. forensicinsight.org Page 15 Data Recoding Mode 覦 伎 (Field) vs. 覦(Reversal) 螳 螳(蠏轟)覲企 覦 豸′蠍郁 覦 蠍一 襦 螳讌 朱 覲 る襯 伎 讌 ろ 覦螳 讀螳 磯 螻 螳襯 讌 蠍一 瑚鍵 螻 螳 蠍壱(Synchronization) 螳 觜語 螻 企瑚? 一 0 1,000螳 蠍磯 蟆曙 SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS.. 蟲覿(Field Separation) 狩 一危(一 0轟 1)螳 蠍磯 蟆曙, 蠍一 螳 蟲覿 豢螳 蟲覿螳 一危 蠍磯 (Data Recording)
  • 16. forensicinsight.org Page 16 Data Recoding Mode 一危 蠍磯 磯ジ 一危, , 襴, 所鍵 煙牡 碁 螻襯 螳覃 轟 覦レ朱 覦 一危磯ゼ 蟲覿 企 蠍壱(clock synchronization) 企 蠍壱 覦 企至 譴企? 語 蠍磯 覦 一危 蠍磯 (Data Recording)
  • 17. forensicinsight.org Page 17 Data Encoding Techniques
  • 18. forensicinsight.org Page 18 Data Encoding Techniques れ 蠍磯 RZ (Return to Zero) NRZ (Non-Return to Zero) NRZI (Non-Return to Zero, Invert) PM (Phase Modulation) FM (Frequency Modulation) MFM (Modified FM) MMFM (Modified MFM) 語 蠍磯 (Encoding Techniques) http://www.lintech.org/comp-per/07MAGREC.pdf
  • 19. forensicinsight.org Page 19 Data Encoding Techniques 譯狩 覲譟 (0 觜 1 覦一 覦 襯 螳讌) 0 : 覦 れ 覦 X 1 : 一 2螳 覦 1970 襷~1980 豐 襦 ろ MFM朱 覲蟆 企 豢螳 覦朱 誤 觜螳 襷れ * N : No flus reversal, R : flux Reversal FM (Frequency Modulation) Bit Pattern Encoding Pattern Flux Reversals Per Bit Bit Pattern Commonality In Random Bit Stream 0 RN 1 50% 1 RR 2 50% Weighted Average 1.5 100%
  • 20. forensicinsight.org Page 20 Data Encoding Techniques 覲 譯狩 覲譟 企 覦 襯 譴 FM レ 一 0 襷 覦 螻襴讀, 語/貊 襦 覲旧 伎姶 貉碁,螳 殊企 襦 ろ 豐蠍 ろ 蟾讌 襦 ろ 譴 MFM (Modified Frequency Modulation) Bit Pattern Encoding Pattern Flux Reversals Per Bit Bit Pattern Commonality In Random Bit Stream 0 (preceded by 0) RN 1 25% 0 (preceded by 1) NN 0 25% 1 NR 1 50% Weighted Average 0.75 100%
  • 21. forensicinsight.org Page 21 Data Encoding Techniques 蠍語 觜碁ゼ 語 蟆 覈 觜碁ゼ 覓苦 伎朱 蠍磯 企/ 覦 狩 蠍語(Run Length) : 覦 伎 豕 螳蟆 (Run Limited) : 覦 伎 豕 螳蟆 れ 覲 譟伎 RLL (1,7), RLL (2,7) RLL (Run Length Limited) (contd)
  • 22. forensicinsight.org Page 22 Data Encoding Techniques RLL (2, 7) RLL 煙レ朱 ろ レ MFM RLLL襦 蟲豌 襦 ろ MFM RLL (Run Length Limited) Bit Pattern Encoding Pattern Flux Reversals Per Bit Bit Pattern Commonality In Random Bit Stream 11 RNNN 1/2 25% 10 NRNN 1/2 25% 011 NNRNNN 1/3 12.5% 010 RNNRNN 2/3 12.5% 000 NNNRNN 1/3 12.5% 0010 NNRNNRNN 2/4 6.25% 0011 NNNNRNNN 1/3 6.25% Weighted Average 0.4635 100%
  • 23. forensicinsight.org Page 23 Data Encoding Techniques 豕豺 蟆豢 (Peak Detection) RLL 語 豕豺 蟆豢 覦 PRML (Partial Response, Maximum Likelihood) (contd)
  • 24. forensicinsight.org Page 24 Data Encoding Techniques 豕豺 蟆豢 螻 覦郁化 ′覲企 豕豺螳 豢覿 蟆曙 蠍磯 覦 讀螳襦 覦 豕豺 襦 覦蟆 豺 螳 覦 螳 譴願 蠍一 瑚鍵襯 譴 豕豺 蟆豢 企れ 企れ 願屋螻 煙ロ 蟆 PRML (覿覿 , 豕 ) PRML RLL 觜 30~40% 蠍磯覦襯 讀螳 PRML (Partial Response, Maximum Likelihood) (contd)
  • 25. forensicinsight.org Page 25 Data Encoding Techniques 覿覿 , 豕 一危 襷 (覿覿 ) 螳 讌 (豕 ) PRML (Partial Response, Maximum Likelihood)
  • 26. forensicinsight.org Page 26 Probability of Physical Data Recovery MFM vs. PRML
  • 27. forensicinsight.org Page 27 Data Encoding Techniques PRML 螻殊 螻襴讀螻 豌襴 襦襯 蟆 伎 る 覦襯 讀螳 PRML 觜 20%~70%蟾讌 蠍磯 覦 讀螳 ろ 覈 EPRML 語 覦 EPRML (Extended PRML)
  • 28. forensicinsight.org Page 28 Data Wiping Techniques
  • 29. forensicinsight.org Page 29 Data Wiping Techniques 伎郁鍵 (Overwriting) 螻 一危一 豺 [0, 1, , 一危]襯 伎 誤 (Encryption) 覦 伎 ろ 轟 誤 螳一(Degaussing) 螳ロ 蠍一レ 伎 蠍磯ろ 覃伎 襴 蟯 覓朱Μ 蟯, 豌螻, (Physical Destruction) 螳ロ 蠍郁襯 覓朱Μ朱 蟲覃 願碓 覦 (Wiping/Sanitization/Secure Erase/Destruction Methods)
  • 30. forensicinsight.org Page 30 Data Wiping Techniques 螳一 vs. 覓朱Μ蟯
  • 31. forensicinsight.org Page 31 Data Wiping Techniques http://en.wikipedia.org/wiki/Data_erasure 伎郁鍵 蠍磯 危 譴 (Standard Overwritten Techniques) 譴 覦覲 觜螻 U.S. Navy 1993 3 覓語, 覲伎, 蟆讀 U.S. Air Force 1996 4 0, 1, 覓語 蟆讀 Peter Gutmann 1996 1-35 襷れ れ 讌 MFM, RLL Bruce Schneier 1996 7 0, 1, 5覯 U.S. DoD 2001 3 覓語, 覲伎, るジ German Federal 2004 2-3 覿蠏豺 , 覲伎 CSEC 2006 3 0(1), 覲伎 覿襯讌 襷れ牡襯 NIST 2006 1 ? U.S. NISP 2006 ? ? 伎 讌讌 NSA/CSS 2007 0 ? 螳一 蟯 Australian 2008 1 ? 螳一 手 觜覦 襷れ牡 蟯 New Zealand 2008 1 ? 蠍磯 一危磯ゼ
  • 32. forensicinsight.org Page 32 Data Wiping Techniques ろ 危 覓朱Μ 麹 ~襷讌襷 蟾讌 伎郁鍵 觜 , 螻糾 危 HPA, DCO 螻 危 一危磯ゼ 蟆 危 覃一危一 蟯 壱(襴豺, 讌ろ碁Μ ) 螻 譴 危 蠍磯 讌 蟲 伎郁鍵 覦 (Overwritten Methods)
  • 33. forensicinsight.org Page 33 Data Wiping Techniques BCWipe (file, folder, free space, windows artifacts, file slack) Hardwipe (file, drive, space) Eraser (file, folder, free space, slack space) CCleaner (windows artifacts) File Shredder (file, folder) SDelete (file, folder, free space) Dariks Boot And Nuke (drive) dd (*nix) (file, drive) 危 蟲 (Wiping Tools)
  • 34. forensicinsight.org Page 34 Probability of Physical Data Recovery
  • 35. forensicinsight.org Page 35 Probability of Physical Data Recovery Secure Deletion of Data from Magnetic and Solid-State Memory (1996) MFM(Magnetic Force Microscopy)襦 覲糾規 螳レ 瑚 0 1 伎磯 0.95, 1 1 伎磯 1.05 螳 蠍磯 伎 一危 豢 螳 蠍磯 郁鍵 る 豺 れ姶 覦 碁 螳レ襴 一危 蟾 豕 35覯 伎郁鍵螳 MFM, (1,7) RLL, (2,7) RLL 覈 PRML 覦 ろ 一危磯ゼ 覈 覯襷 伎 豢覿 狩 蟲碁 朱 (Peter Gutmanns Paper)
  • 36. forensicinsight.org Page 36 Probability of Physical Data Recovery 狩 蟲碁 伎郁鍵 一危 (Peter Gutmanns Overwrite Data)
  • 37. forensicinsight.org Page 37 Probability of Physical Data Recovery Overwriting Hard Drive Data: The Great Wiping Controversy (2008) 覲糾規螳 覿螳ロ蟆 伎磯る 覈 覯 襯 伎 讌 朱 襷 狩 蟲碁 朱 危 一危磯ゼ 覯襷 伎磯 覲糾規 る 朱 貉れ れ 危 覓 襷 螳 蟲 企 朱 蟆讀螻 ろ 企 朱 覩瑚 讌? 覈視 ろ 1 蠍磯 , 0 伎磯 0.95, 1 伎磯 1.05 蠏殊る 豢 襷螳? 螳 郁鍵 1 螳 磯 蟆 螳ロ螳? るジ 朱 (Another Paper)
  • 38. forensicinsight.org Page 38 Probability of Physical Data Recovery MFM 蠍磯 蠍磯レ 覃伎 螻糾 覲企ゼ 1 覦危碁ゼ 覲糾規 4覿 襦 覲 碁 觜 螻 伎 ろ 蠍磯 螻 伎 谿 MFM (Magnetic Force Microscopy)
  • 39. forensicinsight.org Page 39 Probability of Physical Data Recovery 伎 覲 蠍磯 伎 レ 覩語 る 讌 企朱 讌, 螻糾鍵 襴 覦 螻褐 豺? ろ 磯ジ 企 企 蠍磯 覲 螳 手覃 蠍磯レ 螳 襷 貉危語 譴 覦 る 蠍磯 伎 一危 覲伎豈 覲伎(Thermal Recalibration) 螻襴讀 ろ 豢/曙綾 磯ジ 谿 螳 螻襴讀 螳, 企 覿 螳, 語 ろる 螳 れ 碁レ 企 螻 襷 碁 語 狩 伎 蠍磯蠍磯 企れ MFM (Magnetic Force Microscopy)
  • 40. forensicinsight.org Page 40 Probability of Physical Data Recovery 覦 覿 谿 ろ 1 蠍磯 襷 蠍磯 襷 1 螳 蠍磯 螳? 覲, 給, 讌, 螳 磯ジ 覿朱 誤 危 螻襷 覦 覿 る 覩語誤 谿伎襷 螳 豸″蠍磯 企れ 覦 覿 (Distribution of Density)
  • 41. forensicinsight.org Page 41 Probability of Physical Data Recovery 覦 覿 谿 1.06企朱 螳 詞 , 伎 螳 レ瑚? レ瑚? 企れ 螳 讌 磯 殊企 蠍一レ 覿 (渚伎?) 覦 覿 (Distribution of Density)
  • 42. forensicinsight.org Page 42 Probability of Physical Data Recovery 覲糾規 螳レ 蟾 ろ 危 ろ 一危磯ゼ 覲糾規 螳レ煙 0.01% 覲企 螻 ろ(襷結 ろ ) 覲糾規 螳レ焔 螳レ煙 譬 讌襷 覩語 企ゼ 詞企 螳レ煙 覩瑚化 蠍一 覦る? 覩瑚化 ろ 覲企 覩瑚化 蠍一 螻螳 ろ 蠍一 螻 覦 覿 (Distribution of Density)
  • 43. forensicinsight.org Page 43 Probability of Physical Data Recovery ろ 貉碁, 豕 蠍磯 ECC Error Detection : 麹 Servo ル ECC ECC Error Correction : ECC 讌 る 覦朱 覲糾規 Automatic Retry : 螳る 讌企 覲襦 豺襯 覈 谿場 , Advanced Error Correction : 螻蠍 螻襴讀 襴 Failure : 麹磯ゼ 曙 蟆曙, 襦 覲糾規螳 覿螳 譟一襷 螻牛旧 豕 蠍磯 レ 譴企 語 ろる(PRML, EPRML) 襦蠏 螳 蟲褐 覲伎豈 蟆郁骸朱, 伎 螳 企 蟆 襯 蟆 蟯襴 襦讌 (Read Error Severities and Error Management Logic)
  • 44. forensicinsight.org Page 44 Probability of Physical Data Recovery 豺危螻襴 A 讌 蟾 ろ 襷結 ろ (NTFS 蠍磯蓋 麹 蠍磯ゼ 伎 覯 襷) 覡伎 殊企 (ろ 一危磯ゼ 32覯 伎郁鍵, /dev/random) 0朱 伎 豺危螻襴 B 豕豐 蠍磯螻 一 伎郁鍵 5螳讌 覈 0 覈 1 01010101 00111011 00001111 ろ 一危一 覦覯 (Data and Method) (contd)
  • 45. forensicinsight.org Page 45 Probability of Physical Data Recovery 17螳 覈 る Quantum 1GB 2006 豢 覈瑚讌 (SCSI, IDE ) 56螳 ろ ろ ろ 1. 1KB 殊 伎 一危 蠍磯 2. 殊企 螻♀骸 觜碁 覈 曙 3. 76,800 一危 誤 覿 螳 谿襯 5覯 覦覲牛 覿襯 伎 覯伎 襴(Bayes Theorem)襯 れ 覓伎 一危磯ゼ ろ 一危一 覦覯 (Data and Method)
  • 46. forensicinsight.org Page 46 Probability of Physical Data Recovery る 殊企 覈語 襯 覿 企 豐蠍 1 蠍磯 , 0朱 伎 (伎 ) 覲糾規 螳レ (Probability of Recovery)
  • 47. forensicinsight.org Page 47 Probability of Physical Data Recovery 襦 殊企 覈語 襯 覿 企 豐蠍 1 蠍磯 , 0朱 伎 (伎 ) 豢螳 伎郁鍵襯 1, 3 蟆郁骸 觜蟲 覲糾規 螳レ (Probability of Recovery)
  • 48. forensicinsight.org Page 48 Probability of Physical Data Recovery 襦 殊企 覈語 襯 覿 企 螻覦 EPRML 殊企 覲糾規 襯 企 讌 襯螻 2006 覈 ろ 覈 0朱 危 ろ 1 伎殊 豕 49.18%(+/- 0.11) 覲糾規 襯 覈 0朱 危 ろ るジ 豕 36.08%(+/- 0.24) 覲糾規 襯 朱朱 ろ 覲糾規 襯? 覲糾規 螳レ (Probability of Recovery)
  • 49. forensicinsight.org Page 49 Probability of Physical Data Recovery 覲糾規 一危 覿 8 觜碁ゼ 曙 , 1襦 覲糾規 螳レ (Probability of Recovery)
  • 50. forensicinsight.org Page 50 Probability of Physical Data Recovery ろ ろ 一危 覲糾規 蟆郁骸 (豕 覦覯) 覲糾規 螳レ (Probability of Recovery) Secure deletion of data - Peter Gutmann - 1996 Abstract With the use of increasingly sophisticated encryption systems, an attacker wishing to gain access to sensitive data is forced to look elsewhere for information. One avenue of attack is the recovery of supposedly erased data from magnetic media or random-access memory. cKr脱 }d8eti族nof0daI0Ptr0G則tW鱈誰_村1u960eb8t単utW00000D巽#0 Hf$00側000%贈z00達0000叩0叩辰束it|t綻0u続eFf尊i%|esinqTy淡樽op:iaze0 速Mcryption0s樽tems?DKtA""c0+蔵sin0toKai2z歎c(ns~0t端0;e 遜 iti)e""da a>s0fo担ce存t l2o 狸elI其$e旦e催r""inf測rmion.0OnR誰avem>egoN0-即tR"1i l辰h賊0"eoie=y0Czsu即s/`l{eraJd0dataF即ro>magne続;&贈探達叩達%or*rndo捉-Qcc束展0m @ryl00000000000000000
  • 51. forensicinsight.org Page 51 Probability of Physical Data Recovery 蟆郁骸朱 螳覲 觜語 覲糾規 螳レ煙 讌襷 覩 一危磯 覲糾規 覿螳 ろ 譟一 ろ 磯 谿 覦 譴蠍磯 企れ GB/TB 覲企ゼ 朱 蟆 蟲襯 螳覦 蟆 覿螳 る 殊企 譟一姶 螳レ煙 覯 讀蟇磯 蠍一 覿 伎 殊企 覲糾規 螳レ煙 朱 譬 螳 覲糾規 螳レ (Probability of Recovery)
  • 52. forensicinsight.org Page 52 Question and Answer 谿瑚 襭 (Reference) 1. Peter Gutmann, Secure Deletion of Data from Magnetic and Solid-State Memory 2. Craig Wright, Dave Kleiman, Shyaam Sundhar R.S, Overwriting Hard Drive Data: The Great Wiping Controversy 3. PC Guides Hard Disk Data Encoding and Decoding (http://www.pcguide.com/ref/hdd/geom/data.htm) 4. Ian McLoughlin, Magnetic Recording Fundamentals (http://www.lintech.org/comp-per/07MAGREC.pdf)