Donjon

The security research at Ledger

Ledger Labs
  • Tech
  • Security
    • Posts
    • Bug Bounty
    • Security Bulletins
    • Threat Model
  • Stories
Donjon

Donjon CTF 2021: Capture the Fortress!

25 November 2021

We are thrilled to announce the 2021 edition of our annual CTF, which will begin next week on November 30 10:00 CEST! We encourage participants to register and find about the details on

The Donjon 1 min read
Donjon

On the security of Booba's music video and NFTs

22 November 2021

If you bought one or several of these NFTs and wonder if they are safe and secure, don’t worry, they are. You can directly skip the technical details to read the conclusion.

The Donjon 5 min read
Donjon

Remote laser faults injection during pandemic

16 September 2021

During the pandemic, access to our offices has been restricted. Bringing the 200 kg laser station at home was not an option, and conducting laser fault injection research with very limited access to

Olivier Hériveaux 6 min read
Donjon

Protecting SSH keys with TPM 2.0, now available on Debian

2 September 2021

SSH is one of the protocols which are widely used on the Internet: developers use it to push code on a git server (such as GitHub), system administrators use it to connect to

Nicolas Iooss 6 min read
Donjon

On the security model of software wallets

29 July 2021

A cryptocurrency wallet is a device or application able to manage cryptocurrencies and perform transactions for one or several cryptocurrencies. Its main security features are to store user’s private keys, and use them

Jean-Baptiste Bédrune + 1 13 min read
Donjon

Kaspersky Password Manager: All your passwords are belong to us

6 July 2021

The password generator included in Kaspersky Password Manager had several problems. The most critical one is that it used a PRNG not suited for cryptographic purposes. Its single source of entropy was the

Jean-Baptiste Bédrune 18 min read
Donjon

A Compact Electromagnetic Fault Injection Setup

26 January 2021

Physical security threats appear at circuit-level, where an attacker can measure or physically influence the computation/operation performed by the circuit. Side-channel attacks exploit additional sources of information (physical observations), including timing information, power

Karim Abdellatif + 1 3 min read
Donjon

The Making of picoHSM Challenge

15 December 2020

This year the Donjon organized a Capture The Flag competition, where challengers had to solve many security-related challenges for three weeks. Now the competition is over, and it’s time for us to debrief!

The Donjon 8 min read
Donjon

Discovering SMPC through CTF Challenges

10 December 2020

At Ledger, we often hear about blockchains that take advantages of new breakthroughs in cryptography or computer science in general. For example, Ethereum 2.0 uses BLS signature algorithm instead of traditional ECDSA, Monero

The Donjon 9 min read
Donjon

Exploiting Smart Contracts in CTF Challenges

10 December 2020

At Ledger, we often hear about blockchains which enable their users to create programs that run “on the blockchain”, in a decentralized way. A very famous example of such a blockchain is Ethereum,

The Donjon 9 min read
Donjon

Ghostbuster: Spectre exploitation in real life

25 November 2020

After doing some research on Transient execution CPU vulnerabilities against Intel SGX enclaves, we wondered if these vulnerabilities were practical in real life, with fully patched operating systems and default mitigations. We took

The Donjon 15 min read
Donjon

CTF 2020: Capture the Fortress

21 October 2020

We are thrilled to officially announce the Ledger Donjon CTF, which will begin next week on October 28 10:00 CEST! We encourage participants to register and find about the details on the dedicated

The Donjon 1 min read
Page 1 of 2 Older Posts >
Ledger Labs © 2022
Proudly published with Jekyll & GitHub Pages using Jasper2
About Twitter Donjon Twitter GitHub Donjon Github