Search for "Manuel Bonk" returned 119 results
32 min
Finding the Weak Crypto Needle in a Byte Haystack
Automatic detection of key-reuse vulnerabilities
48 min
Seidenstraße
The Making of…
64 min
Source Code and Cross-Domain Authorship Attribution
The Role of Stylometry in Privacy
60 min
Building a high throughput low-latency PCIe based SDR
Lessons learnt implementing PCIe on FPGA for XTRX Software…
47 min
flow3r Badge
Frag die Teams
126 min
Logbuch:Netzpolitik 466
Die Ibiza-Affäre und ihre Folgen
45 min
Triggering Deep Vulnerabilities Using Symbolic Execution
Deep program analysis without the headache
38 min
What your phone won’t tell you
Uncovering fake base stations on iOS devices
60 min
Mein Bot, der Kombattant
Operative Kommunikation im digitalen Informationskrieg
61 min
How to Hack Your Way to Space
Bringing the Hacker Mindset to the Space Ecosphere - The…
41 min