본문 바로가기
  • Home

Forensic Analysis of Hidden Areas in Self-Encrypting Storage

  • Journal of Internet of Things and Convergence
  • Abbr : JKIOTS
  • 2025, 11(2), pp.83~88
  • Publisher : The Korea Internet of Things Society
  • Research Area : Engineering > Computer Science > Internet Information Processing
  • Received : March 14, 2025
  • Accepted : April 16, 2025
  • Published : April 30, 2025

Byung-Gook Kim 1 Ryu Gab Sang 2

1동신대학교 컴퓨터학과
2동신대학교

Accredited

ABSTRACT

This paper focuses on the hidden areas of self-encrypting drives (SEDs) that comply with the Trusted Computing Group (TCG) storage specification. In general, data storage devices include not only areas accessible via standard read and write commands provided to end-users but also hidden areas such as the Host Protected Area (HPA) and Device Configuration Overlay (DCO), which are inaccessible through conventional commands. These hidden areas may not be detectable by standard industrial tools, posing potential security risks to digital forensic investigators and corporate security administrators. The existence of such hidden areas significantly increases the risk that a forensic image of the storage device may not represent a true physical copy, potentially leading to incomplete or inaccurate investigative results due to concealed data. Moreover, data residing in these areas may persist despite deletion procedures carried out using typical industrial tools, resulting in the retention of sensitive information. This paper introduces the unique hidden areas present in self-encrypting drives compliant with the TCG storage specification. It further demonstrates, through the use of open-source and freely available tools, that users can access, modify, and write data within these hidden regions. Finally, the paper discusses the potential implications of these hidden areas in digital forensic investigations and proposes corresponding countermeasures.

Citation status

* References for papers published after 2023 are currently being built.