20240045958. ANTI-MALWARE ALGORITHM AND HW/FW FOR INTERNAL SSD HEALTH AND STORAGE SPACE PROTECTION AGAINST CYBER-ATTACKS simplified abstract (SAMSUNG ELECTRONICS CO., LTD.)
ANTI-MALWARE ALGORITHM AND HW/FW FOR INTERNAL SSD HEALTH AND STORAGE SPACE PROTECTION AGAINST CYBER-ATTACKS
Organization Name
Inventor(s)
Alexander Bunin of Ganei Tikva (IL)
Evgeny Blaichman of Tel-Aviv (IL)
ANTI-MALWARE ALGORITHM AND HW/FW FOR INTERNAL SSD HEALTH AND STORAGE SPACE PROTECTION AGAINST CYBER-ATTACKS - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240045958 titled 'ANTI-MALWARE ALGORITHM AND HW/FW FOR INTERNAL SSD HEALTH AND STORAGE SPACE PROTECTION AGAINST CYBER-ATTACKS
Simplified Explanation
The abstract describes a storage system that includes a host device and a storage device with a nonvolatile memory and a processor. The storage device has a storage internal protection (SIP) module that performs several functions.
- The SIP module obtains a plurality of storage commands from the host device that correspond to the nonvolatile memory.
- It filters the storage commands to obtain a filtered plurality of storage commands.
- The module applies information about the filtered commands to a machine-learning cryptocurrency mining (CM) detection algorithm.
- If the CM detection algorithm indicates the detection of a CM operation, the module provides a notification to the host device.
Potential applications of this technology:
- Preventing unauthorized cryptocurrency mining: The technology can detect and notify the host device about cryptocurrency mining operations, helping prevent unauthorized mining activities.
- Enhancing storage security: By filtering and analyzing storage commands, the system can identify potentially malicious operations and provide an additional layer of security for the storage device.
Problems solved by this technology:
- Unauthorized cryptocurrency mining: The technology helps detect and prevent unauthorized cryptocurrency mining operations, which can consume significant computing resources and lead to financial losses.
- Malicious storage operations: By filtering and analyzing storage commands, the system can identify and prevent malicious operations that may compromise the integrity or security of the storage device.
Benefits of this technology:
- Improved security: The system enhances the security of the storage device by detecting and notifying the host device about potentially malicious operations.
- Resource optimization: By preventing unauthorized cryptocurrency mining, the system helps optimize computing resources and prevents unnecessary consumption of power and processing capabilities.
Original Abstract Submitted
a storage system, including a host device; and a storage device including a nonvolatile memory and at least one processor configured to implement a storage internal protection (sip) module, wherein the sip module is configured to: obtain, from the host device, a plurality of storage commands corresponding to the nonvolatile memory, filter the plurality of storage commands to obtain a filtered plurality of storage commands, apply information about the filtered plurality of storage commands to a machine-learning cryptocurrency mining (cm) detection algorithm, and based on the machine-learning cm detection algorithm indicating that a cm operation is detected, provide a notification to the host device.