Harald Baier

Orcid: 0000-0002-9254-6398

According to our database1, Harald Baier authored at least 93 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Causal Inconsistencies Are Normal in Windows Memory Dumps (Too).
DTRAP, 2024

Data Synthesis Is Going Mobile - On Community-Driven Dataset Generation for Android Devices.
DTRAP, 2024

Hypervisor-based data synthesis: On its potential to tackle the curse of client-side agent remnants in forensic image generation.
Forensic Sci. Int. Digit. Investig., 2024

Ubi est indicium? On forensic analysis of the UBI file system.
Forensic Sci. Int. Digit. Investig., 2024

Scenario-based Data Set Generation for Use in Digital Forensics: A Case Study.
Proceedings of the 54. Jahrestagung der Gesellschaft für Informatik, 2024

Towards arbitrating in a dispute - on responsible usage of client-side perceptual hashing against illegal content distribution.
Proceedings of the European Interdisciplinary Cybersecurity Conference, 2024

Towards Reducing Business-Risk of Data Theft Implementing Automated Simulation Procedures of Evil Data Exfiltration.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
Threat-Based Simulation of Data Exfiltration Toward Mitigating Multiple Ransomware Extortions.
DTRAP, 2023

Back and Forth - On Automatic Exposure of Origin and Dissemination of Files on Windows.
DTRAP, 2023

Data for Digital Forensics: Why a Discussion on "How Realistic is Synthetic Data" is Dispensable.
DTRAP, 2023

Applying Activity-Based Models to Integrate Labeled Preset Key Events in Intra-Day Human Mobility Scenarios.
Proceedings of the 9th International Conference on Vehicle Technology and Intelligent Transport Systems, 2023

To Possess or Not to Possess - WhatsApp for Android Revisited with a Focus on Stickers.
Proceedings of the Secure IT Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, 2023

Using Perceptual Hashing for Targeted Content Scanning.
Proceedings of the Advances in Digital Forensics XIX, 2023

Enhancing Incident Management by an Improved Understanding of Data Exfiltration: Definition, Evaluation, Review.
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023

2022
Revisiting the dataset gap problem - On availability, assessment and perspective of mobile forensic corpora.
Digit. Investig., 2022

FRASHER - A framework for automated evaluation of similarity hashing.
Digit. Investig., 2022

ForTrace - A holistic forensic data set synthesis framework.
Digit. Investig., 2022

Realistic and Configurable Synthesis of Malware Traces in Windows Systems.
Proceedings of the Advances in Digital Forensics XVIII, 2022

Smartphone Data Distributions and Requirements for Realistic Mobile Device Forensic Corpora.
Proceedings of the Advances in Digital Forensics XVIII, 2022

Cyber Crime Undermines Data Privacy Efforts - On the Balance Between Data Privacy and Security.
Proceedings of the Digital Forensics and Cyber Crime - 13th EAI International Conference, 2022

Towards Efficient On-Site CSAM Triage by Clustering Images from a Source Point of View.
Proceedings of the Digital Forensics and Cyber Crime - 13th EAI International Conference, 2022

Mapping Cyber-Physical Threats for Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2022

2021
Evaluation of Network Traffic Analysis Using Approximate Matching Algorithms.
Proceedings of the Advances in Digital Forensics XVII, 2021

Towards Mitigation of Data Exfiltration Techniques Using the MITRE ATT&CK Framework.
Proceedings of the Digital Forensics and Cyber Crime - 12th EAI International Conference, 2021

Find My IoT Device - An Efficient and Effective Approximate Matching Algorithm to Identify IoT Traffic Flows.
Proceedings of the Digital Forensics and Cyber Crime - 12th EAI International Conference, 2021

2020
Distributed DDoS Defense: A collaborative Approach at Internet Scale.
Proceedings of the NOMS 2020, 2020

A Novel Approach for Generating Synthetic Datasets for Digital Forensics.
Proceedings of the Advances in Digital Forensics XVI, 2020

2019
bring2lite: A Structural Concept and Tool for Forensic Data Analysis and Recovery of Deleted SQLite Records.
Digit. Investig., 2019

On efficiency of artifact lookup strategies in digital forensics.
Digit. Investig., 2019

Towards exact and inexact approximate matching of executable binaries.
Digit. Investig., 2019

Revisiting Data Hiding Techniques for Apple File System.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Methods for accuracy-preserving acceleration of large-scale comparisons in CPU-based iris recognition systems.
IET Biom., 2018

Anti-forensics in ext4: On secrecy and usability of timestamp-based data hiding.
Digit. Investig., 2018

DDoS defense using MTD and SDN.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Anti-Forensic Capacity and Detection Rating of Hidden Data in the Ext4 Filesystem.
Proceedings of the Advances in Digital Forensics XIV, 2018

On Efficiency and Effectiveness of Linear Function Detection Approaches for Memory Carving.
Proceedings of the Digital Forensics and Cyber Crime - 10th International EAI Conference, 2018

fishy - A Framework for Implementing Filesystem-Based Data Hiding Techniques.
Proceedings of the Digital Forensics and Cyber Crime - 10th International EAI Conference, 2018

Multi-sample Compression of Iris Images Using High Efficiency Video Coding.
Proceedings of the 2018 International Conference on Biometrics, 2018

Botnet Detection in Anonymous Networks.
Proceedings of the 12th International Conference on Autonomous Infrastructure, 2018

2017
Approxis: A Fast, Robust, Lightweight and Approximate Disassembler Considered in the Field of Memory Forensics.
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017

Enhancing Breeder Document Long-Term Security Using Blockchain Technology.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
Collaborative DDoS defense using flow-based security event information.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Correlating network events and transferring labels in the presence of IP address anonymisation.
Proceedings of the 12th International Conference on Network and Service Management, 2016

A Preliminary Study on the Feasibility of Storing Fingerprint and Iris Image Data in 2D-Barcodes.
Proceedings of the 2016 International Conference of the Biometrics Special Interest Group, 2016

In Whom Do We Trust - Sharing Security Events.
Proceedings of the Management and Security in the Age of Hyperconnectivity, 2016

2015
Towards automated preprocessing of bulk data in digital forensic investigations using hash functions.
it Inf. Technol., 2015

Towards reproducible cyber-security research through complex node automation.
Proceedings of the 7th International Conference on New Technologies, Mobility and Security, 2015

Improving the Detection of Encrypted Data on Storage Devices.
Proceedings of the Ninth International Conference on IT Security Incident Management & IT Forensics, 2015

Towards Automated Incident Handling: How to Select an Appropriate Response against a Network-Based Attack?
Proceedings of the Ninth International Conference on IT Security Incident Management & IT Forensics, 2015

How to exchange security events? Overview and evaluation of formats and protocols.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Collaborative attack mitigation and response: A survey.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Towards Bloom filter-based indexing of iris biometric data.
Proceedings of the International Conference on Biometrics, 2015

A research process that ensures reproducible network security research.
Proceedings of the 11th International Conference on Network and Service Management, 2015

2014
An Efficient Similarity Digests Database Lookup - A Logarithmic Divide & Conquer Approach.
J. Digit. Forensics Secur. Law, 2014

Towards a more secure and scalable verifying PKI of eMRTD.
J. Comput. Secur., 2014

On application of bloom filters to iris biometrics.
IET Biom., 2014

On the database lookup problem of approximate matching.
Digit. Investig., 2014

A Small Data Approach to Identification of Individuals on the Transport Layer using Statistical Behaviour Templates.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

AFAUC - Anti-forensics of Storage Devices by Alternative Use of Communication Channels.
Proceedings of the Eighth International Conference on IT Security Incident Management & IT Forensics, 2014

Similarity Hashing Based on Levenshtein Distances.
Proceedings of the Advances in Digital Forensics X, 2014

Blessing or curse? Revisiting security aspects of Software-Defined Networking.
Proceedings of the 10th International Conference on Network and Service Management, 2014

A Plea for Utilising Synthetic Data when Performing Machine Learning Based Cyber-Security Experiments.
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014

Are We Missing Labels? A Study of the Availability of Ground-Truth in Network Security Research.
Proceedings of the Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2014

Towards Electronic Identification and Trusted Services for Biometric Authenticated Transactions in the Single Euro Payments Area.
Proceedings of the Privacy Technologies and Policy - Second Annual Privacy Forum, 2014

2013
FRASH: A framework to test algorithms of similarity hashing.
Digit. Investig., 2013

mvHash-B - A New Approach for Similarity Preserving Hashing.
Proceedings of the Seventh International Conference on IT Security Incident Management and IT Forensics, 2013

Towards a Process Model for Hash Functions in Digital Forensics.
Proceedings of the Digital Forensics and Cyber Crime - Fifth International Conference, 2013

COFFEE: a Concept based on OpenFlow to Filter and Erase Events of botnet activity at high-speed nodes.
Proceedings of the 43. Jahrestagung der Gesellschaft für Informatik, 2013

Performance Evaluation of Classification and Feature Selection Algorithms for NetFlow-based Protocol Recognition.
Proceedings of the 43. Jahrestagung der Gesellschaft für Informatik, 2013

Have a Break - Have a Security Centre: From DZI to CASED.
Proceedings of the Number Theory and Cryptography, 2013

Security considerations on extending PACE to a biometric-based connection establishment.
Proceedings of the 2013 BIOSIG, 2013

Anomaly Detection and Mitigation at Internet Scale: A Survey.
Proceedings of the Emerging Management Mechanisms for the Future Internet, 2013

Passive Remote Source NAT Detection Using Behavior Statistics Derived from NetFlow.
Proceedings of the Emerging Management Mechanisms for the Future Internet, 2013

2012
On the Investigation of Application Specific Data within Digital Forensics.
Proceedings of the 7th International Workshop on Digital Forensics and Incident Analysis, 2012

Properties of a similarity preserving hash function and their realization in sdhash.
Proceedings of the 2012 Information Security for South Africa, 2012

Towards Efficient and Privacy-Preserving Network-Based Botnet Detection Using Netflow Data.
Proceedings of the Ninth International Network Conference (INC 2012), 2012

Similarity Preserving Hashing: Eligible Properties and a New Algorithm MRSH-v2.
Proceedings of the Digital Forensics and Cyber Crime - 4th International Conference, 2012

2011
Rooting Android - Extending the ADB by an Auto-connecting WiFi-Accessible Service.
Proceedings of the Information Security Technology for Applications, 2011

Security Aspects of Piecewise Hashing in Computer Forensics.
Proceedings of the Sixth International Conference on IT Security Incident Management and IT Forensics, 2011

Performance Issues About Context-Triggered Piecewise Hashing.
Proceedings of the Digital Forensics and Cyber Crime - Third International ICST Conference, 2011

A concept for monitoring self-transforming code using memory page access control management.
Proceedings of the International Carnahan Conference on Security Technology, 2011

A quality score honoring approach to semantic conformance assessment of minutiae-based feature extractors.
Proceedings of the BIOSIG 2011, 2011

2010
The Cost of Observation for Intrusion Detection: Performance Impact of Concurrent Host Observation.
Proceedings of the Information Security South Africa Conference 2010, 2010

Manipulating Mobile Devices with a Private GSM Base Station - A Case Study.
Proceedings of the Eighth International Network Conference (INC 2010), 2010

2009
Vom elektronischen Reisepass zum Personalausweis: RFID und personenbezogene Daten - Lessons Learned!?
Proceedings of the 39. Jahrestagung der Gesellschaft für Informatik, Im Focus das Leben, INFORMATIK 2009, Lübeck, Germany, September 28, 2009

Validity Models of Electronic Signatures and Their Enforcement in Practice.
Proceedings of the Public Key Infrastructures, Services and Applications, 2009

A Note on the Protection Level of Biometric Data in Electronic Passports.
Proceedings of the BIOSIG 2009, 2009

2004
A Framework for Evaluating the Usability and the Utility of PKI-enabled Applications.
Proceedings of the Public Key Infrastructure, 2004

2003
How to Compute the Coefficients of the Elliptic Modular Function <i>j</i>(<i>z</i>).
Exp. Math., 2003

2002
Efficient algorithms for generating elliptic curves over finite fields suitable for use in cryptography.
PhD thesis, 2002

2001
Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography.
Proceedings of the Progress in Cryptology, 2001

Efficient Computation of Singular Moduli with Application in Cryptography.
Proceedings of the Fundamentals of Computation Theory, 13th International Symposium, 2001

2000
Efficient Construction of Cryptographically Strong Elliptic Curves.
Proceedings of the Progress in Cryptology, 2000


  Loading...