default search action
Sascha Wessel
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c21]Simon Ott, Monika Kamhuber, Joana Pecholt, Sascha Wessel:
Universal Remote Attestation for Cloud and Edge Platforms. ARES 2023: 12:1-12:11 - [c20]Barbora Hrdá, Sascha Wessel:
Confidential Quantum Computing. ARES 2023: 46:1-46:10 - 2022
- [c19]Joana Pecholt, Sascha Wessel:
CoCoTPM: Trusted Platform Modules for Virtual Machines in Confidential Computing Environments. ACSAC 2022: 989-998 - [p1]Monika Huber, Sascha Wessel, Gerd Stefan Brost, Nadja Menz:
Building Trust in Data Spaces. Designing Data Spaces 2022: 147-164 - 2021
- [c18]Joana Pecholt, Monika Huber, Sascha Wessel:
Live Migration of Operating System Containers in Encrypted Virtual Machines. CCSW 2021: 125-137
2010 – 2019
- 2019
- [j3]Manuel Huber, Julian Horsch, Junaid Ali, Sascha Wessel:
Freeze and Crypt: Linux kernel support for main memory encryption. Comput. Secur. 86: 420-436 (2019) - 2018
- [c17]Gerd Stefan Brost, Manuel Huber, Michael Weiß, Mykolai Protsenko, Julian Schütte, Sascha Wessel:
An Ecosystem and IoT Device Architecture for Building Trust in the Industrial Data Space. CPSS@AsiaCCS 2018: 39-50 - [c16]Mathias Morbitzer, Manuel Huber, Julian Horsch, Sascha Wessel:
SEVered: Subverting AMD's Virtual Machine Encryption. EuroSec@EuroSys 2018: 1:1-1:6 - [i2]Julian Schütte, Gerd Stefan Brost, Sascha Wessel:
Der Trusted Connector im Industrial Data Space. CoRR abs/1804.09442 (2018) - [i1]Mathias Morbitzer, Manuel Huber, Julian Horsch, Sascha Wessel:
SEVered: Subverting AMD's Virtual Machine Encryption. CoRR abs/1805.09604 (2018) - 2017
- [c15]Manuel Huber, Julian Horsch, Sascha Wessel:
Protecting Suspended Devices from Memory Attacks. EUROSEC 2017: 10:1-10:6 - [c14]Manuel Huber, Julian Horsch, Junaid Ali, Sascha Wessel:
Freeze & Crypt: Linux Kernel Support for Main Memory Encryption. SECRYPT 2017: 17-30 - [c13]Julian Horsch, Manuel Huber, Sascha Wessel:
TransCrypt: Transparent Main Memory Encryption Using a Minimal ARM Hypervisor. TrustCom/BigDataSE/ICESS 2017: 152-161 - 2016
- [j2]Manuel Huber, Benjamin Taubmann, Sascha Wessel, Hans P. Reiser, Georg Sigl:
A flexible framework for mobile device forensics based on cold boot attacks. EURASIP J. Inf. Secur. 2016: 17 (2016) - [c12]Julian Horsch, Sascha Wessel, Claudia Eckert:
CoKey: fast token-based cooperative cryptography. ACSAC 2016: 314-323 - 2015
- [j1]Sascha Wessel, Manuel Huber, Frederic Stumpf, Claudia Eckert:
Improving mobile device security with operating system-level virtualization. Comput. Secur. 52: 207-220 (2015) - [c11]Benjamin Taubmann, Manuel Huber, Sascha Wessel, Lukas Heim, Hans Peter Reiser, Georg Sigl:
A Lightweight Framework for Cold Boot Based Forensics on Mobile Devices. ARES 2015: 120-128 - [c10]Manuel Huber, Julian Horsch, Michael Velten, Michael Weiß, Sascha Wessel:
A Secure Architecture for Operating System-Level Virtualization on Mobile Devices. Inscrypt 2015: 430-450 - [c9]Michael Velten, Peter Schneider, Sascha Wessel, Claudia Eckert:
User Identity Verification Based on Touchscreen Interaction Analysis in Web Contexts. ISPEC 2015: 268-282 - [c8]Julian Horsch, Sascha Wessel:
Transparent Page-Based Kernel and User Space Execution Tracing from a Custom Minimal ARM Hypervisor. TrustCom/BigDataSE/ISPA (1) 2015: 408-417 - 2014
- [c7]Julian Horsch, Sascha Wessel, Frederic Stumpf, Claudia Eckert:
SobrTrA: a software-based trust anchor for ARM cortex application processors. CODASPY 2014: 273-280 - [c6]Julian Horsch, Konstantin Böttinger, Michael Weiß, Sascha Wessel, Frederic Stumpf:
TrustID: trustworthy identities for untrusted mobile devices. CODASPY 2014: 281-288 - [c5]Michael Weiß, Steffen Wagner, Roland Hellman, Sascha Wessel:
Integrity Verification and Secure Loading of Remote Binaries for Microkernel-Based Runtime Environments. TrustCom 2014: 544-551 - 2013
- [c4]Michael Velten, Sascha Wessel, Frederic Stumpf, Claudia Eckert:
Active File Integrity Monitoring Using Paravirtualized Filesystems. INTRUST 2013: 53-69 - [c3]Sascha Wessel, Frederic Stumpf, Ilja Herdt, Claudia Eckert:
Improving Mobile Device Security with Operating System-Level Virtualization. SEC 2013: 148-161 - 2012
- [c2]Peter Schoo, Manfred Schäfer, André Egners, Hans Hofinger, Sascha Wessel, Marián Kühnel, Sascha Todt, Michael Montag:
Collaboration between Competing Mobile Network Operators to Improve CIIP. CRITIS 2012: 215-227 - [c1]Steffen Wagner, Sascha Wessel, Frederic Stumpf:
Attestation of Mobile Baseband Stacks. NSS 2012: 29-43
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint