Hardware encryption implementations should perform at least as well as software implementations. In this research I worked through the process of learning about the architecture of embedded Solid-State Drives. Once the architecture was understood, the firmware located could be extracted and analyzed to better understand drive operations and security. A long-term goal of this research is to find weaknesses and vulnerabilities in the firmware of these embedded devices that we could benefit from.