Obserwuj
Paul Baecher
Paul Baecher
Zweryfikowany adres z cs.tu-darmstadt.de - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
The nepenthes platform: An efficient approach to collect malware
P Baecher, M Koetter, T Holz, M Dornseif, F Freiling
Recent Advances in Intrusion Detection, 165-184, 2006
5082006
Know your enemy: Tracking botnets
P Bacher, T Holz, M Kotter, G Wicherski
The Honeynet Project & Research Alliance, 2005
2712005
Notions of black-box reductions, revisited
P Baecher, C Brzuska, M Fischlin
Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013
502013
Breaking reCAPTCHA: a holistic approach via shape recognition
P Baecher, N Büscher, M Fischlin, B Milde
Future Challenges in Security and Privacy for Academia and Industry: 26th …, 2011
492011
PUF-Based Authentication Protocols-Revisited.
H Busch, S Katzenbeisser, P Baecher
WISA 9, 296-308, 2009
352009
Captchas: the good, the bad, and the ugly
P Baecher, MGL Fischlin, R Langenberg, M Lützow, D Schröder
Sicherheit 2010. Sicherheit, Schutz und Zuverlässigkeit, 2010
322010
Massively-parallel simulation of biochemical systems
J Ackermann, P Baecher, T Franzel, M Goesele, K Hamacher
Informatik 2009–Im Focus das Leben, 2009
252009
Know your enemy: Tracking botnets, 2005
P Bacher, T Holz, M Kotter, G Wicherski
URL http://www. honeynet. org/papers/bots 4, 24-33, 2016
182016
Reset indifferentiability and its consequences
P Baecher, C Brzuska, A Mittelbach
Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013
112013
libemu–X86 shellcode emulation
P Baecher, M Koetter
112012
Ideal-cipher (ir) reducibility for blockcipher-based hash functions
P Baecher, P Farshim, M Fischlin, M Stam
Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013
102013
Random oracle reducibility
P Baecher, M Fischlin
Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011
102011
Expedient non-malleability notions for hash functions
P Baecher, M Fischlin, D Schröder
Topics in Cryptology–CT-RSA 2011: The Cryptographers’ Track at the RSA …, 2011
102011
Tracking Botnets: Using honeynets to learn more about Bots
P Bacher, T Holz, M Kotter, G Wicherski
The Honeynet Project and Research Alliance. Retrieved July 23, 2006, 2005
92005
The malware collection tool (mwcollect)
P Baecher, T Holz, M Kötter, G Wicherski
82016
Know your enemy: Tracking botnets. The Honeynet Project and Research Alliance
P Bächer, T Holz, M Kötter, G Wicherski
Tech. Rep, 2005
72005
libemu, 2009
P Baecher, M Koetter
6
Know your enemy: Tracking botnets, May 2005
P Bacher, T Holz, M Kotter, G Wicherski
5
Getting around non-executable stack (and fix)
P Baecher, M Koetter
5
Simon's Circuit
P Baecher
Cryptology ePrint Archive, 2014
32014
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20