skip to main content
10.1145/2414456.2414484acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

CARMA: a hardware tamper-resistant isolated execution environment on commodity x86 platforms

Published: 02 May 2012 Publication History

Abstract

Much effort has been spent to reduce the software Trusted Computing Base (TCB) of modern systems. However, there remains a large and complex hardware TCB, including memory, peripherals, and system buses. There are many stronger, but still realistic, adversary models where we need to consider that this hardware may be malicious or compromised. Thus, there is a practical need to determine whether we can achieve secure program execution in the presence of not only malicious software, but also malicious hardware.

Cited By

View all
  • (2024)CacheIEE: Cache-Assisted Isolated Execution Environment on ARM Multi-Core PlatformsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.325141821:1(254-269)Online publication date: Jan-2024
  • (2024)A novel ALM based security framework for block chain in healthcare platformInternational Journal of System Assurance Engineering and Management10.1007/s13198-024-02443-3Online publication date: 4-Aug-2024
  • (2021)Ghost routing to enable oblivious computation on memory-centric networksProceedings of the 48th Annual International Symposium on Computer Architecture10.1109/ISCA52012.2021.00077(930-943)Online publication date: 14-Jun-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ASIACCS '12: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
May 2012
119 pages
ISBN:9781450316484
DOI:10.1145/2414456
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 May 2012

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Conference

ASIA CCS '12
Sponsor:

Acceptance Rates

Overall Acceptance Rate 418 of 2,322 submissions, 18%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 17 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)CacheIEE: Cache-Assisted Isolated Execution Environment on ARM Multi-Core PlatformsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.325141821:1(254-269)Online publication date: Jan-2024
  • (2024)A novel ALM based security framework for block chain in healthcare platformInternational Journal of System Assurance Engineering and Management10.1007/s13198-024-02443-3Online publication date: 4-Aug-2024
  • (2021)Ghost routing to enable oblivious computation on memory-centric networksProceedings of the 48th Annual International Symposium on Computer Architecture10.1109/ISCA52012.2021.00077(930-943)Online publication date: 14-Jun-2021
  • (2019)EMMAProceedings of the 52nd Annual IEEE/ACM International Symposium on Microarchitecture10.1145/3352460.3358261(983-995)Online publication date: 12-Oct-2019
  • (2019)TIO - Secure Input/Output for Intel SGX Enclaves2019 International Workshop on Secure Internet of Things (SIOT)10.1109/SIOT48044.2019.9637105(1-9)Online publication date: 26-Sep-2019
  • (2019)PriRoster: Privacy-preserving Radio Context Attestation in Cognitive Radio Networks2019 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN)10.1109/DySPAN.2019.8935740(1-10)Online publication date: Nov-2019
  • (2018)Locally Decodable and Updatable Non-malleable Codes and Their ApplicationsJournal of Cryptology10.1007/s00145-018-9306-zOnline publication date: 27-Nov-2018
  • (2017)Generic Semantic Security against a Kleptographic AdversaryProceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security10.1145/3133956.3133993(907-922)Online publication date: 30-Oct-2017
  • (2016)DARPAProceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks10.1145/2939918.2939938(171-182)Online publication date: 18-Jul-2016
  • (2016)CaSE: Cache-Assisted Secure Execution on ARM Processors2016 IEEE Symposium on Security and Privacy (SP)10.1109/SP.2016.13(72-90)Online publication date: May-2016
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media