This talk will describe the research system that result in the discovery of those vulnerabilities, covering certain equipment and tactics. Outcomes on the investigate might be in-depth, like protocol actions, packet formats, and technical specifics of each and every vulnerability.This talk offers investigate about the forensic implications of SSDs