{"id":"https://openalex.org/W4387298261","doi":"https://doi.org/10.1145/3607199.3607248","title":"Quarantine: Mitigating Transient Execution Attacks with Physical Domain Isolation","display_name":"Quarantine: Mitigating Transient Execution Attacks with Physical Domain Isolation","publication_year":2023,"publication_date":"2023-10-03","ids":{"openalex":"https://openalex.org/W4387298261","doi":"https://doi.org/10.1145/3607199.3607248"},"language":"en","primary_location":{"id":"doi:10.1145/3607199.3607248","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3607199.3607248","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3607199.3607248","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3607199.3607248","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051269226","display_name":"M.L.M. Hertogh","orcid":"https://orcid.org/0009-0008-4912-414X"},"institutions":[{"id":"https://openalex.org/I865915315","display_name":"Vrije Universiteit Amsterdam","ror":"https://ror.org/008xxew50","country_code":"NL","type":"education","lineage":["https://openalex.org/I865915315"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Math\u00e9 Hertogh","raw_affiliation_strings":["Vrije Universiteit Amsterdam, Netherlands"],"raw_orcid":"https://orcid.org/0009-0008-4912-414X","affiliations":[{"raw_affiliation_string":"Vrije Universiteit Amsterdam, Netherlands","institution_ids":["https://openalex.org/I865915315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102858623","display_name":"Manuel Wiesinger","orcid":"https://orcid.org/0009-0003-1988-1362"},"institutions":[{"id":"https://openalex.org/I865915315","display_name":"Vrije Universiteit Amsterdam","ror":"https://ror.org/008xxew50","country_code":"NL","type":"education","lineage":["https://openalex.org/I865915315"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Manuel Wiesinger","raw_affiliation_strings":["Vrije Universiteit Amsterdam, Netherlands"],"raw_orcid":"https://orcid.org/0009-0003-1988-1362","affiliations":[{"raw_affiliation_string":"Vrije Universiteit Amsterdam, Netherlands","institution_ids":["https://openalex.org/I865915315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074416953","display_name":"Sebastian \u00d6sterlund","orcid":"https://orcid.org/0000-0003-0636-9848"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sebastian \u00d6sterlund","raw_affiliation_strings":["Intel Corporation, Netherlands"],"raw_orcid":"https://orcid.org/0000-0003-0636-9848","affiliations":[{"raw_affiliation_string":"Intel Corporation, Netherlands","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044846337","display_name":"Marius Muench","orcid":"https://orcid.org/0000-0002-3393-5123"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Marius Muench","raw_affiliation_strings":["Vrije Universiteit Amsterdam, United Kingdom"],"raw_orcid":"https://orcid.org/0000-0002-3393-5123","affiliations":[{"raw_affiliation_string":"Vrije Universiteit Amsterdam, United Kingdom","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088968741","display_name":"Nadav Amit","orcid":"https://orcid.org/0000-0002-6643-6232"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nadav Amit","raw_affiliation_strings":["VMware Research, USA"],"raw_orcid":"https://orcid.org/0000-0002-6643-6232","affiliations":[{"raw_affiliation_string":"VMware Research, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029566823","display_name":"Herbert Bos","orcid":"https://orcid.org/0000-0001-6179-1510"},"institutions":[{"id":"https://openalex.org/I865915315","display_name":"Vrije Universiteit Amsterdam","ror":"https://ror.org/008xxew50","country_code":"NL","type":"education","lineage":["https://openalex.org/I865915315"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Herbert Bos","raw_affiliation_strings":["Vrije Universiteit Amsterdam, Netherlands"],"raw_orcid":"https://orcid.org/0000-0001-6179-1510","affiliations":[{"raw_affiliation_string":"Vrije Universiteit Amsterdam, Netherlands","institution_ids":["https://openalex.org/I865915315"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083941826","display_name":"Cristiano Giuffrida","orcid":"https://orcid.org/0000-0002-8329-5929"},"institutions":[{"id":"https://openalex.org/I865915315","display_name":"Vrije Universiteit Amsterdam","ror":"https://ror.org/008xxew50","country_code":"NL","type":"education","lineage":["https://openalex.org/I865915315"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Cristiano Giuffrida","raw_affiliation_strings":["Vrije Universiteit Amsterdam, Netherlands"],"raw_orcid":"https://orcid.org/0000-0002-8329-5929","affiliations":[{"raw_affiliation_string":"Vrije Universiteit Amsterdam, Netherlands","institution_ids":["https://openalex.org/I865915315"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5051269226"],"corresponding_institution_ids":["https://openalex.org/I865915315"],"apc_list":null,"apc_paid":null,"fwci":1.3633,"has_fulltext":true,"cited_by_count":8,"citation_normalized_percentile":{"value":0.84960943,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"207","last_page":"221"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9801999926567078,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10478","display_name":"Diamond and Carbon-based Materials Research","score":0.9750000238418579,"subfield":{"id":"https://openalex.org/subfields/2505","display_name":"Materials Chemistry"},"field":{"id":"https://openalex.org/fields/25","display_name":"Materials Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7699368000030518},{"id":"https://openalex.org/keywords/isolation","display_name":"Isolation (microbiology)","score":0.61845463514328},{"id":"https://openalex.org/keywords/transient","display_name":"Transient (computer programming)","score":0.6182210445404053},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5597295761108398},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.44214317202568054},{"id":"https://openalex.org/keywords/attack-surface","display_name":"Attack surface","score":0.4194217622280121},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.41228264570236206},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3738751709461212},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.37252503633499146}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7699368000030518},{"id":"https://openalex.org/C2775941552","wikidata":"https://www.wikidata.org/wiki/Q25212305","display_name":"Isolation (microbiology)","level":2,"score":0.61845463514328},{"id":"https://openalex.org/C2780799671","wikidata":"https://www.wikidata.org/wiki/Q17087362","display_name":"Transient (computer programming)","level":2,"score":0.6182210445404053},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5597295761108398},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.44214317202568054},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.4194217622280121},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.41228264570236206},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3738751709461212},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.37252503633499146},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C89423630","wikidata":"https://www.wikidata.org/wiki/Q7193","display_name":"Microbiology","level":1,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1145/3607199.3607248","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3607199.3607248","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3607199.3607248","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses","raw_type":"proceedings-article"},{"id":"pmh:oai:research.vu.nl:openaire/c763e1aa-ae72-49a5-b6e6-fbd97609fdbf","is_oa":true,"landing_page_url":"https://research.vu.nl/en/publications/c763e1aa-ae72-49a5-b6e6-fbd97609fdbf","pdf_url":null,"source":{"id":"https://openalex.org/S4306401107","display_name":"VU Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I865915315","host_organization_name":"Vrije Universiteit Amsterdam","host_organization_lineage":["https://openalex.org/I865915315"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Hertogh, M, Wiesinger, M, \u00d6sterlund, S, Muench, M, Amit, N, Bos, H & Giuffrida, C 2023, QUARANTINE : Mitigating Transient Execution Attacks with Physical Domain Isolation. in RAID '23 : Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses. ACM International Conference Proceeding Series, Association for Computing Machinery, pp. 207-221, 26th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2023, Hong Kong, China, 16/10/23. https://doi.org/10.1145/3607199.3607248","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:pure.atira.dk:publications/c1544a1f-8bf4-4135-b968-bd71d77d9af8","is_oa":true,"landing_page_url":"https://research.birmingham.ac.uk/en/publications/c1544a1f-8bf4-4135-b968-bd71d77d9af8","pdf_url":"https://download.vusec.net/papers/quarantine_raid23.pdf","source":{"id":"https://openalex.org/S4306402634","display_name":"University of Birmingham Research Portal (University of Birmingham)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79619799","host_organization_name":"University of Birmingham","host_organization_lineage":["https://openalex.org/I79619799"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Hertogh , M , Wiesinger , M , \u00d6sterlund , S , Muench , M , Amit , N , Bos , H & Giuffrida , C 2023 , Quarantine : Mitigating Transient Execution Attacks with Physical Domain Isolation . in RAID '23 : Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses . RAID: Research in Attacks, Intrusions and Defenses , Association for Computing Machinery (ACM) , pp. 207\u2013221 , RAID 2023 , Hong Kong , Hong Kong , 16/10/23 . https://doi.org/10.1145/3607199.3607248","raw_type":"contributionToPeriodical"},{"id":"pmh:oai:research.vu.nl:openaire_cris_publications/c763e1aa-ae72-49a5-b6e6-fbd97609fdbf","is_oa":true,"landing_page_url":"https://hdl.handle.net/1871.1/c763e1aa-ae72-49a5-b6e6-fbd97609fdbf","pdf_url":null,"source":{"id":"https://openalex.org/S4306401107","display_name":"VU Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I865915315","host_organization_name":"Vrije Universiteit Amsterdam","host_organization_lineage":["https://openalex.org/I865915315"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Hertogh, M, Wiesinger, M, \u00d6sterlund, S, Muench, M, Amit, N, Bos, H & Giuffrida, C 2023, QUARANTINE : Mitigating Transient Execution Attacks with Physical Domain Isolation. in RAID '23 : Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses. ACM International Conference Proceeding Series, Association for Computing Machinery, pp. 207-221, 26th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2023, Hong Kong, China, 16/10/23. https://doi.org/10.1145/3607199.3607248","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:research.vu.nl:publications/c763e1aa-ae72-49a5-b6e6-fbd97609fdbf","is_oa":true,"landing_page_url":"http://www.scopus.com/inward/record.url?scp=85173129947&partnerID=8YFLogxK","pdf_url":null,"source":{"id":"https://openalex.org/S4306401107","display_name":"VU Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I865915315","host_organization_name":"Vrije Universiteit Amsterdam","host_organization_lineage":["https://openalex.org/I865915315"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Hertogh, M, Wiesinger, M, \u00d6sterlund, S, Muench, M, Amit, N, Bos, H & Giuffrida, C 2023, QUARANTINE : Mitigating Transient Execution Attacks with Physical Domain Isolation. in RAID '23 : Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses. ACM International Conference Proceeding Series, Association for Computing Machinery, pp. 207-221, 26th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2023, Hong Kong, China, 16/10/23. https://doi.org/10.1145/3607199.3607248","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"doi:10.1145/3607199.3607248","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3607199.3607248","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3607199.3607248","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G463539330","display_name":null,"funder_award_id":"SBA-K1","funder_id":"https://openalex.org/F4320323031","funder_display_name":"\u00d6sterreichische Forschungsf\u00f6rderungsgesellschaft"}],"funders":[{"id":"https://openalex.org/F4320307102","display_name":"Intel Corporation","ror":"https://ror.org/01ek73717"},{"id":"https://openalex.org/F4320316785","display_name":"VMware","ror":null},{"id":"https://openalex.org/F4320318434","display_name":"Bundesministerium f\u00fcr Klimaschutz, Umwelt, Energie, Mobilit\u00e4t, Innovation und Technologie","ror":null},{"id":"https://openalex.org/F4320321800","display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","ror":"https://ror.org/04jsz6e67"},{"id":"https://openalex.org/F4320323031","display_name":"\u00d6sterreichische Forschungsf\u00f6rderungsgesellschaft","ror":"https://ror.org/028jc0449"},{"id":"https://openalex.org/F4320327593","display_name":"Bundesministerium f\u00fcr Digitalisierung und Wirtschaftsstandort","ror":null},{"id":"https://openalex.org/F4320329167","display_name":"SBA Research","ror":"https://ror.org/05nny6x17"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4387298261.pdf","grobid_xml":"https://content.openalex.org/works/W4387298261.grobid-xml"},"referenced_works_count":38,"referenced_works":["https://openalex.org/W1529355856","https://openalex.org/W1964322740","https://openalex.org/W2105321788","https://openalex.org/W2107776555","https://openalex.org/W2134479933","https://openalex.org/W2134939854","https://openalex.org/W2135359801","https://openalex.org/W2145312209","https://openalex.org/W2160701576","https://openalex.org/W2253471257","https://openalex.org/W2255548496","https://openalex.org/W2259879138","https://openalex.org/W2350778671","https://openalex.org/W2734941459","https://openalex.org/W2761578098","https://openalex.org/W2799171747","https://openalex.org/W2810584084","https://openalex.org/W2884163605","https://openalex.org/W2897494537","https://openalex.org/W2954241526","https://openalex.org/W2963311060","https://openalex.org/W2976763854","https://openalex.org/W2978325751","https://openalex.org/W2982848142","https://openalex.org/W3011167962","https://openalex.org/W3015844221","https://openalex.org/W3023053109","https://openalex.org/W3029114445","https://openalex.org/W3096372727","https://openalex.org/W3112409568","https://openalex.org/W3152901657","https://openalex.org/W3158610705","https://openalex.org/W3190597741","https://openalex.org/W4220832017","https://openalex.org/W4288057796","https://openalex.org/W4289038676","https://openalex.org/W6637813809","https://openalex.org/W6968978714"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W2478244259","https://openalex.org/W2187854411","https://openalex.org/W2588479842","https://openalex.org/W2902040535","https://openalex.org/W41015297","https://openalex.org/W2883540030","https://openalex.org/W4386875494","https://openalex.org/W2728977822"],"abstract_inverted_index":{"Since":[0],"the":[1,8,17,47,81,91],"Spectre":[2],"and":[3,96],"Meltdown":[4],"disclosure":[5],"in":[6],"2018,":[7],"list":[9],"of":[10,20],"new":[11],"transient":[12],"execution":[13],"vulnerabilities":[14],"that":[15,57,87],"abuse":[16],"shared":[18],"nature":[19],"microarchitectural":[21,99],"resources":[22],"on":[23,49,90],"CPU":[24,94],"cores":[25,95],"has":[26],"been":[27],"growing":[28],"rapidly.":[29],"In":[30],"response,":[31],"vendors":[32],"keep":[33],"deploying":[34],"\u201cspot\u201d":[35],"(per-variant)":[36],"mitigations,":[37],"which":[38],"have":[39],"become":[40],"increasingly":[41],"costly":[42],"when":[43],"combined":[44],"against":[45],"all":[46],"attacks\u2014especially":[48],"older-generation":[50],"processors.":[51],"Indeed,":[52],"some":[53],"are":[54],"so":[55],"expensive":[56],"system":[58],"administrators":[59],"may":[60],"not":[61,79],"deploy":[62],"them":[63],"at":[64],"all.":[65],"Worse":[66],"still,":[67],"spot":[68],"mitigations":[69],"can":[70],"only":[71],"address":[72],"known":[73],"(N-day)":[74],"attacks":[75],"as":[76],"they":[77],"do":[78],"tackle":[80],"underlying":[82],"problem:":[83],"different":[84],"security":[85],"domains":[86],"run":[88],"simultaneously":[89],"same":[92],"physical":[93],"share":[97],"their":[98],"resources.":[100]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
