Follow
Paul Baecher
Paul Baecher
Verified email at cs.tu-darmstadt.de - Homepage
Title
Cited by
Cited by
Year
The nepenthes platform: An efficient approach to collect malware
P Baecher, M Koetter, T Holz, M Dornseif, F Freiling
Recent Advances in Intrusion Detection, 165-184, 2006
4962006
Know your enemy: Tracking botnets
P Bacher, T Holz, M Kotter, G Wicherski
The Honeynet Project & Research Alliance, 2005
2722005
Breaking reCAPTCHA: a holistic approach via shape recognition
P Baecher, N Büscher, M Fischlin, B Milde
IFIP International Information Security Conference, 56-67, 2011
512011
Notions of black-box reductions, revisited
P Baecher, C Brzuska, M Fischlin
International Conference on the Theory and Application of Cryptology and …, 2013
452013
Puf-based authentication protocols–revisited
H Busch, S Katzenbeisser, P Baecher
International Workshop on Information Security Applications, 296-308, 2009
342009
Captchas: the good, the bad, and the ugly
P Baecher, MGL Fischlin, R Langenberg, M Lützow, D Schröder
Sicherheit 2010. Sicherheit, Schutz und Zuverlässigkeit, 2010
302010
Massively-parallel simulation of biochemical systems
J Ackermann, P Baecher, T Franzel, M Goesele, K Hamacher
Informatik 2009–Im Focus das Leben, 2009
262009
Know your enemy: Tracking botnets, 2005
P Bacher, T Holz, M Kotter, G Wicherski
URL http://www. honeynet. org/papers/bots 4, 24-33, 2016
172016
Reset indifferentiability and its consequences
P Baecher, C Brzuska, A Mittelbach
International Conference on the Theory and Application of Cryptology and …, 2013
112013
libemu–X86 shellcode emulation
P Baecher, M Koetter
112012
Ideal-cipher (ir) reducibility for blockcipher-based hash functions
P Baecher, P Farshim, M Fischlin, M Stam
Annual International Conference on the Theory and Applications of …, 2013
102013
Random oracle reducibility
P Baecher, M Fischlin
Annual Cryptology Conference, 21-38, 2011
102011
Expedient non-malleability notions for hash functions
P Baecher, M Fischlin, D Schröder
Cryptographers’ Track at the RSA Conference, 268-283, 2011
92011
Tracking Botnets: Using honeynets to learn more about Bots
P Bacher, T Holz, M Kotter, G Wicherski
The Honeynet Project and Research Alliance. Retrieved July 23, 2006, 2005
92005
The malware collection tool (mwcollect)
P Baecher, T Holz, M Kötter, G Wicherski
82016
Know your enemy: Tracking botnets. The Honeynet Project and Research Alliance
P Bacher, T Holz, M Kotter, G Wicherski
Tech. Rep, 2005
72005
libemu, 2009
P Baecher, M Koetter
6
Know your enemy: Tracking botnets, May 2005
P Bacher, T Holz, M Kotter, G Wicherski
5
Getting around non-executable stack (and fix)
P Baecher, M Koetter
5
Simon's Circuit
P Baecher
Cryptology ePrint Archive, 2014
32014
The system can't perform the operation now. Try again later.
Articles 1–20