Follow
Paul Baecher
Paul Baecher
Verified email at cs.tu-darmstadt.de - Homepage
Title
Cited by
Cited by
Year
The nepenthes platform: An efficient approach to collect malware
P Baecher, M Koetter, T Holz, M Dornseif, F Freiling
Recent Advances in Intrusion Detection, 165-184, 2006
5242006
Know your enemy: Tracking botnets
P Bacher, T Holz, M Kotter, G Wicherski
The Honeynet Project & Research Alliance, 2005
2772005
Notions of black-box reductions, revisited
P Baecher, C Brzuska, M Fischlin
Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013
582013
Breaking reCAPTCHA: a holistic approach via shape recognition
P Baecher, N Büscher, M Fischlin, B Milde
Future Challenges in Security and Privacy for Academia and Industry: 26th …, 2011
562011
Puf-based authentication protocols–revisited
H Busch, S Katzenbeisser, P Baecher
International Workshop on Information Security Applications, 296-308, 2009
382009
Captchas: the good, the bad, and the ugly
P Baecher, MGL Fischlin, R Langenberg, M Lützow, D Schröder
Gesellschaft für Informatik eV, 2010
292010
Massively-Parallel Simulation of Biochemical Systems.
J Ackermann, P Baecher, T Franzel, M Goesele, K Hamacher
GI Jahrestagung, 739-750, 2009
252009
Know your enemy: Tracking botnets, 2005
P Bacher, T Holz, M Kotter, G Wicherski
URL http://www. honeynet. org/papers/bots 4, 24-33, 2016
182016
libemu–X86 shellcode emulation
P Baecher, M Koetter
122012
Expedient non-malleability notions for hash functions
P Baecher, M Fischlin, D Schröder
Topics in Cryptology–CT-RSA 2011: The Cryptographers’ Track at the RSA …, 2011
122011
Random oracle reducibility
P Baecher, M Fischlin
Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011
112011
Reset indifferentiability and its consequences
P Baecher, C Brzuska, A Mittelbach
Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013
102013
Ideal-cipher (ir) reducibility for blockcipher-based hash functions
P Baecher, P Farshim, M Fischlin, M Stam
Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013
102013
Tracking Botnets: Using honeynets to learn more about Bots
P Bacher, T Holz, M Kotter, G Wicherski
The Honeynet Project and Research Alliance. Retrieved July 23, 2006, 2005
102005
The malware collection tool (mwcollect)
P Baecher, T Holz, M Kötter, G Wicherski
82016
libemu, 2009
P Baecher, M Koetter
6
Know your enemy: Tracking botnets, May 2005
P Bacher, T Holz, M Kotter, G Wicherski
5
Getting around non-executable stack (and fix)
P Baecher, M Koetter
5
Simon's Circuit
P Baecher
Cryptology ePrint Archive, 2014
32014
Know your enemy: Tracking botnets. The Honeynet Project and Research Alliance
P Bächer, T Holz, M Kötter, G Wicherski
Tech. Rep, 2005
32005
The system can't perform the operation now. Try again later.
Articles 1–20