Sascha Wessel

Orcid: 0000-0002-9063-8416

According to our database1, Sascha Wessel authored at least 26 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Universal Remote Attestation for Cloud and Edge Platforms.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

Confidential Quantum Computing.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
CoCoTPM: Trusted Platform Modules for Virtual Machines in Confidential Computing Environments.
Proceedings of the Annual Computer Security Applications Conference, 2022

Building Trust in Data Spaces.
Proceedings of the Designing Data Spaces: The Ecosystem Approach to Competitive Advantage, 2022

2021
Live Migration of Operating System Containers in Encrypted Virtual Machines.
Proceedings of the CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security Workshop, 2021

2019
Freeze and Crypt: Linux kernel support for main memory encryption.
Comput. Secur., 2019

2018
Der Trusted Connector im Industrial Data Space.
CoRR, 2018

SEVered: Subverting AMD's Virtual Machine Encryption.
Proceedings of the 11th European Workshop on Systems Security, 2018

An Ecosystem and IoT Device Architecture for Building Trust in the Industrial Data Space.
Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, 2018

2017
TransCrypt: Transparent Main Memory Encryption Using a Minimal ARM Hypervisor.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Freeze & Crypt: Linux Kernel Support for Main Memory Encryption.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Protecting Suspended Devices from Memory Attacks.
Proceedings of the 10th European Workshop on Systems Security, 2017

2016
A flexible framework for mobile device forensics based on cold boot attacks.
EURASIP J. Inf. Secur., 2016

CoKey: fast token-based cooperative cryptography.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Improving mobile device security with operating system-level virtualization.
Comput. Secur., 2015

Transparent Page-Based Kernel and User Space Execution Tracing from a Custom Minimal ARM Hypervisor.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

User Identity Verification Based on Touchscreen Interaction Analysis in Web Contexts.
Proceedings of the Information Security Practice and Experience, 2015

A Secure Architecture for Operating System-Level Virtualization on Mobile Devices.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

A Lightweight Framework for Cold Boot Based Forensics on Mobile Devices.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Integrity Verification and Secure Loading of Remote Binaries for Microkernel-Based Runtime Environments.
Proceedings of the 13th IEEE International Conference on Trust, 2014

SobrTrA: a software-based trust anchor for ARM cortex application processors.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

TrustID: trustworthy identities for untrusted mobile devices.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

2013
Improving Mobile Device Security with Operating System-Level Virtualization.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

Active File Integrity Monitoring Using Paravirtualized Filesystems.
Proceedings of the Trusted Systems - 5th International Conference, 2013

2012
Attestation of Mobile Baseband Stacks.
Proceedings of the Network and System Security - 6th International Conference, 2012

Collaboration between Competing Mobile Network Operators to Improve CIIP.
Proceedings of the Critical Information Infrastructures Security, 2012


  Loading...