Abstract:
Apparatus and method for verifying firmware used by a programmable processor in a processor-based device, such as but not limited to a solid-state drive (SSD). In some embodiments, the firmware is stored in a device memory and is accessed to generate an output value using a suitable mathematical function, such as a cryptographic function, a cyclic redundancy check (CRC) function, etc. The output value is used to verify a state of the firmware, such as by ensuring a proper version of firmware has been loaded, that an attacking party has not tampered with the firmware, etc. The firmware may be subsequently loaded and executed by the programmable processor responsive to successful verification. A nonce value supplied by a host can be incorporated into the output value generation process.
Abstract:
Displaying storage device status conditions using multi-color light emitting diodes (LEDs) involves monitoring values of a status condition of at least one persistent storage device. The values are mapped to two or more colors, and at least one multi-color LED displays the two or more colors in response to the respective values.
Abstract:
A distributed data storage system can consist an attack module connected to distributed data storage system that has at least one host connected to a first data storage device and a second data storage device via a network controller. A susceptibility to a third-party attack in the distributed data storage system may be identified with the attack module, which prompts the generation of an attack counter strategy with the attack module. The attack counter strategy can have at least one proactive action directed at preventing a future third-party attack on the detected susceptibility that is executed prior to a third-party attack to temporarily randomize execution timing of a data access operation of the distributed data storage system.
Abstract:
Displaying storage device status conditions using multi-color light emitting diodes (LEDs) involves monitoring values of a status condition of at least one persistent storage device. The values are mapped to two or more colors, and at least one multi-color LED displays the two or more colors in response to the respective values.
Abstract:
A distributed data storage system can consist an attack module connected to distributed data storage system that has at least one host connected to a first data storage device and a second data storage device via a network controller. A susceptibility to a third-party attack in the distributed data storage system may be identified with the attack module, which prompts the generation of an attack counter strategy with the attack module. The attack counter strategy can have at least one proactive action directed at preventing a future third-party attack on the detected susceptibility that is executed prior to a third-party attack to temporarily randomize execution timing of a data access operation of the distributed data storage system.
Abstract:
Apparatus and method for protecting firmware and other types of control data used in a processor-based device, such as but not limited to a solid-state drive (SSD). In some embodiments, the firmware is stored in a firmware store as a plurality of program instructions in a first sequence. The program instructions are loaded to a local memory in a different, second sequence. In some cases, a random number is generated and the second sequence is selected using the random number. A translation table may be generated and used by a programmable processor to locate the various program instructions in the second sequence. In other cases, instructions with calls and other references to other instruction lines are modified based on the order in the local memory. Other forms of control data may also be generated and stored to the local memory in a random order and interspersed with the firmware.