Paul Baecher
Paul Baecher
Verified email at cs.tu-darmstadt.de - Homepage
Title
Cited by
Cited by
Year
The nepenthes platform: An efficient approach to collect malware
P Baecher, M Koetter, T Holz, M Dornseif, F Freiling
Recent Advances in Intrusion Detection, 165-184, 2006
4952006
Know your enemy: Tracking botnets
P Bacher, T Holz, M Kotter, G Wicherski
The Honeynet Project & Research Alliance, 2005
2702005
Breaking reCAPTCHA: a holistic approach via shape recognition
P Baecher, N Büscher, M Fischlin, B Milde
IFIP International Information Security Conference, 56-67, 2011
502011
Notions of black-box reductions, revisited
P Baecher, C Brzuska, M Fischlin
International Conference on the Theory and Application of Cryptology and …, 2013
392013
Puf-based authentication protocols–revisited
H Busch, S Katzenbeisser, P Baecher
International Workshop on Information Security Applications, 296-308, 2009
322009
Captchas: The good, the bad, and the ugly
P Baecher, MGL Fischlin, R Langenberg, M Lützow, D Schröder
Sicherheit 2010. Sicherheit, Schutz und Zuverlässigkeit, 2010
312010
Massively-parallel simulation of biochemical systems
J Ackermann, P Baecher, T Franzel, M Goesele, K Hamacher
Informatik 2009–Im Focus das Leben, 2009
262009
Know your enemy: Tracking botnets, 2005
P Bacher, T Holz, M Kotter, G WICH-ERSKI
URL http://www. honeynet. org/papers/bots 4, 24-33, 2016
172016
libemu–X86 shellcode emulation
P Baecher, M Koetter
112012
Reset indifferentiability and its consequences
P Baecher, C Brzuska, A Mittelbach
International Conference on the Theory and Application of Cryptology and …, 2013
102013
Ideal-cipher (ir) reducibility for blockcipher-based hash functions
P Baecher, P Farshim, M Fischlin, M Stam
Annual International Conference on the Theory and Applications of …, 2013
102013
Random oracle reducibility
P Baecher, M Fischlin
Annual Cryptology Conference, 21-38, 2011
102011
Tracking Botnets: Using honeynets to learn more about Bots
P Bacher, T Holz, M Kotter, G Wicherski
The Honeynet Project and Research Alliance. Retrieved July 23, 2006, 2005
92005
The malware collection tool (mwcollect)
P Baecher, T Holz, M Kötter, G Wicherski
92005
Expedient non-malleability notions for hash functions
P Baecher, M Fischlin, D Schröder
Cryptographers’ Track at the RSA Conference, 268-283, 2011
82011
Know your Enemy: Tracking Botnets. The Honeynet Project and Research Alliance
P Bacher, T Holz, M Kotter, G Wicherski
Tech. Rep, 2005
72005
libemu, 2009
P Baecher, M Koetter
6
Know your enemy: Tracking botnets. from the Honeynet Project
P Bacher, T Holz, M Kotter, G Wicherski
March, 2005
52005
Know your enemy: Tracking botnets, May 2005
P Bacher, T Holz, M Kotter, G Wicherski
5
Getting around non-executable stack (and fix)
P Baecher, M Koetter
5
The system can't perform the operation now. Try again later.
Articles 1–20