[HBW+14]    Julian Horsch, Konstantin Böttinger, Michael Weiß, Sascha Wessel, and Frederic Stumpf. Trustid: Trustworthy identities for untrusted mobile devices. In Proceedings of the 4th ACM Conference on Data and Application Security and Privacy, CODASPY ’14, pages 281–288, New York, NY, USA, 2014. ACM.

[HHV+15]    Manuel Huber, Julian Horsch, Michael Velten, Michael Weiss, and Sascha Wessel. A secure architecture for operating system-level virtualization on mobile devices. In Proceedings of the 11th International Conference on Information Security and Cryptology (Inscrypt 2015), 2015.

[PWS15]    Sergej Proskurin, Michael Weiß, and Georg Sigl. seTPM: Towards Flexible Trusted Computing on Mobile Devices based on GlobalPlatform Secure Elements. In Smart Card Research and Advanced Application, 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Proceedings, 2015.

[WHS12]    Michael Weiß, Benedikt Heinz, and Frederic Stumpf. A cache timing attack on aes in virtualization environments. In Angelos D. Keromytis, editor, Financial Cryptography and Data Security, volume 7397 of Lecture Notes in Computer Science, pages 314–328. Springer Berlin Heidelberg, 2012.

[WWAS15]    Michael Weiß, Benjamin Weggenmann, Moritz August, and Georg Sigl. Trusted Systems: 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers, chapter On Cache Timing Attacks Considering Multi-core Aspects in Virtualized Embedded Systems, pages 151–167. Springer International Publishing, Cham, 2015.

[WWHW14]   Michael Weiss, Steffen Wagner, Roland Hellmann, and Sascha Wessel. Integrity Verification and Secure Loading of Remote Binaries for Microkernel-based Runtime Environments. In 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE Computer Society, 2014.