Donjon

The security research at Ledger

Remote laser faults injection during pandemic

Remote laser faults injection during pandemic

How we improved our laser test bench to work remotely during the pandemic

Protecting SSH keys with TPM 2.0

Protecting SSH keys with TPM 2.0

Using a Trusted Platform Module to store SSH keys on Linux

On the security model of software wallets

On the security model of software wallets

How software wallets protect your assets? What is their security model? Do they resist to malware or targeted attacks?

Kaspersky Password Manager: All your passwords are belong to us

Kaspersky Password Manager: All your passwords ...

Password generated by Kaspersky Password Manager were predictable (CVE-2020-27020).

A Compact Electromagnetic Fault Injection Setup

A Compact Electromagnetic Fault Injection Setup

Introducing the EM setup of Donjon

The Making of picoHSM Challenge

The Making of picoHSM Challenge

Ledger Donjon CTF 2020 - picoHSM challenge details

Discovering SMPC through CTF Challenges

Discovering SMPC through CTF Challenges

Ledger Donjon CTF 2020 - Creating challenges from vulnerabilities in SMPC implementation

Exploiting Smart Contracts in CTF Challenges

Exploiting Smart Contracts in CTF Challenges

Ledger Donjon CTF 2020 - Creating smart contract challenges

Ghostbuster: Spectre exploitation in real life

Ghostbuster: Spectre exploitation in real life

Ledger Donjon CTF 2020 - Ghostbuster write-up

CTF 2020: Capture the Fortress

CTF 2020: Capture the Fortress

Ledger Donjon CTF will begin next week on October 28!

KeepKey Hardware Wallet Under The Scope

KeepKey Hardware Wallet Under The Scope

A side-channel attack on the PIN verification of the KeepKey hardware wallet allows to retrieve the PIN of the device...

Lit by Laser: PIN Code Recovery on Coldcard Mk2 Wallets

Lit by Laser: PIN Code Recovery on Coldcard Mk2...

How the Donjon performed a PIN code recovery on a Coldcard Mk2 wallet.

Ledger's CTF 2018 and side-channels

Ledger's CTF 2018 and side-channels

Solving Ledger's whitebox challenge with Side-Channel attacks

Everybody be Cool, This is a Robbery!

Everybody be Cool, This is a Robbery!

Summary of the HSM vulnerabilities exposed at Black Hat 2019

OLED screen (minor) vulnerability

OLED screen (minor) vulnerability

Details on the side-channel vulnerability reported by Christian Reitter

Funds are SSSAFU - Stealing the funds of all HTC EXODUS 1 users

Funds are SSSAFU - Stealing the funds of all HT...

How a bad implementation of Shamir Secret Sharing allows to steal all the cryptocurrencies stored on a HTC EXODUS 1...

Unfixable Seed Extraction on Trezor - A practical and reliable attack

Unfixable Seed Extraction on Trezor - A practic...

An attacker with a stolen device can extract the seed from the device. It takes less than 5 minutes and...

Extracting seed from Ellipal wallet

Extracting seed from Ellipal wallet

Ellipal is a hardware wallet based on air-gapped Android device, Our study showed that communication interfaces could be re-enabled

Breaking Trezor One with Side Channel Attacks

Breaking Trezor One with Side Channel Attacks

A Side Channel Attack on PIN verification allows an attacker with a stolen Trezor One to retrieve the correct value...

Extracting seeds from Wallets

Extracting seeds from Wallets

An executive summary of the Donjon findings during the research.

Rainbow

Rainbow

Introducing Rainbow: Donjon's side-channel analysis simulation tool

Introducing Ledger Donjon

Introducing Ledger Donjon

A very high level description of Ledger Donjon - the security research at Ledger.