Search for "Manuel Bonk" returned 119 results

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Seidenstraße
48 min

Seidenstraße

The Making of…

Building a high throughput low-latency PCIe based SDR
60 min

Building a high throughput low-latency PCIe based SDR

Lessons learnt implementing PCIe on FPGA for XTRX Software…

Triggering Deep Vulnerabilities Using Symbolic Execution
45 min

Triggering Deep Vulnerabilities Using Symbolic Execution

Deep program analysis without the headache

What your phone won’t tell you
38 min

What your phone won’t tell you

Uncovering fake base stations on iOS devices

Mein Bot, der Kombattant
60 min

Mein Bot, der Kombattant

Operative Kommunikation im digitalen Informationskrieg

Flohmarkt
43 min

Flohmarkt

Eine dezentrale föderierte Inseratplattform

How to Hack Your Way to Space
61 min

How to Hack Your Way to Space

Bringing the Hacker Mindset to the Space Ecosphere - The…