The nepenthes platform: An efficient approach to collect malware P Baecher, M Koetter, T Holz, M Dornseif, F Freiling Recent Advances in Intrusion Detection, 165-184, 2006 | 524 | 2006 |
Know your enemy: Tracking botnets P Bacher, T Holz, M Kotter, G Wicherski The Honeynet Project & Research Alliance, 2005 | 275 | 2005 |
Notions of black-box reductions, revisited P Baecher, C Brzuska, M Fischlin Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013 | 58 | 2013 |
Breaking reCAPTCHA: a holistic approach via shape recognition P Baecher, N Büscher, M Fischlin, B Milde Future Challenges in Security and Privacy for Academia and Industry: 26th …, 2011 | 57 | 2011 |
Puf-based authentication protocols–revisited H Busch, S Katzenbeisser, P Baecher International Workshop on Information Security Applications, 296-308, 2009 | 38 | 2009 |
Captchas: the good, the bad, and the ugly P Baecher, MGL Fischlin, R Langenberg, M Lützow, D Schröder Gesellschaft für Informatik eV, 2010 | 29 | 2010 |
Massively-Parallel Simulation of Biochemical Systems. J Ackermann, P Baecher, T Franzel, M Goesele, K Hamacher GI Jahrestagung, 739-750, 2009 | 25 | 2009 |
Know your enemy: Tracking botnets, 2005 P Bacher, T Holz, M Kotter, G Wicherski URL http://www. honeynet. org/papers/bots 4, 24-33, 2016 | 18 | 2016 |
Expedient non-malleability notions for hash functions P Baecher, M Fischlin, D Schröder Topics in Cryptology–CT-RSA 2011: The Cryptographers’ Track at the RSA …, 2011 | 13 | 2011 |
libemu–X86 shellcode emulation P Baecher, M Koetter | 12 | 2012 |
Random oracle reducibility P Baecher, M Fischlin Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011 | 11 | 2011 |
Reset indifferentiability and its consequences P Baecher, C Brzuska, A Mittelbach Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013 | 10 | 2013 |
Ideal-cipher (ir) reducibility for blockcipher-based hash functions P Baecher, P Farshim, M Fischlin, M Stam Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013 | 10 | 2013 |
Tracking Botnets: Using honeynets to learn more about Bots P Bacher, T Holz, M Kotter, G Wicherski The Honeynet Project and Research Alliance. Retrieved July 23, 2006, 2005 | 10 | 2005 |
The malware collection tool (mwcollect) P Baecher, T Holz, M Kötter, G Wicherski | 8 | 2016 |
libemu, 2009 P Baecher, M Koetter | 6 | |
Getting around non-executable stack (and fix) P Baecher, M Koetter | 6 | |
Know your enemy: Tracking botnets, May 2005 P Bacher, T Holz, M Kotter, G Wicherski | 5 | |
Simon's Circuit P Baecher Cryptology ePrint Archive, 2014 | 3 | 2014 |
Know your enemy: Tracking botnets. The Honeynet Project and Research Alliance P Bächer, T Holz, M Kötter, G Wicherski Tech. Rep, 2005 | 3 | 2005 |