Overview
Syllabus
Intro
A long story short...
How is cryptocurrency stored?
What's a hardware wallet?
Security stickers
Counterfeiting is a real problem
Removing Tamper Stickers with hot air
Stickers cause confusion
Sticker Attack Takeaways
Opening Enclosures
What do you do once it's opened?
Goals for the hardware implant
When do you install an implant?
supermicro.fun - works on a breadboard
Antenna design
Is my backdoored device genuine?
The attacker can use moar power
Supply Chain Attack Takeaways - Recap
The Ledger Nano S security model
Ledger STM32 Firmware Upgrade
Ledger STM32 Bootloader
Ledger Nano S boot process
First attempt..
After more reversing..
The STM32 memory map...
Second attempt...
Ledger Nano S MCU verification
MCU verification bypassing...
Building the compressor
Public releases
Ledger Blue: Inside
Analyzing the signal
Getting training data...
How accurate is it?
Glitching - Backstory
DC 25 RECAP - Breaking Bitcoin Board
DC 25 RECAP - ChipWhisperer Glitch
Prior STM32 Security Research
STM32 Read-out Protection (RDP)
STM32F2 Boot process (1.8ms)
STM32F2 Boot process (1.4ms)
Power consumption after reset (2009)
Glitching the Trezor One
Reviewing the upgrade procedure...
Getting the seed
The Trezor Glitcher
Taught by
media.ccc.de