{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T06:24:23Z","timestamp":1767853463404,"version":"3.49.0"},"publisher-location":"Cham","reference-count":58,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031171420","type":"print"},{"value":"9783031171437","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-17143-7_11","type":"book-chapter","created":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T04:04:22Z","timestamp":1663905862000},"page":"209-228","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["CPU Port Contention Without SMT"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7041-4300","authenticated-orcid":false,"given":"Thomas","family":"Rokicki","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8896-9494","authenticated-orcid":false,"given":"Cl\u00e9mentine","family":"Maurice","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6744-3410","authenticated-orcid":false,"given":"Michael","family":"Schwarz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,24]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Abel, A., Reineke, J.: Uops.info: characterizing latency, throughput, and port usage of instructions on intel microarchitectures. In: ASPLOS (2019)","DOI":"10.1145\/3297858.3304062"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Acar, G., Eubank, C., Englehardt, S., Ju\u00e1rez, M., Narayanan, A., D\u00edaz, C.: The web never forgets: persistent tracking mechanisms in the wild. In: CCS (2014)","DOI":"10.1145\/2660267.2660347"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Aldaya, A.C., Brumley, B.B., Ul Hassan, S., Garc\u00eda, C.P., Tuveri, N.: Port contention for fun and profit. In: S &P (2019)","DOI":"10.1109\/SP.2019.00066"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Andrysco, M., Kohlbrenner, D., Mowery, K., Jhala, R., Lerner, S., Shacham, H.: On subnormal floating point and abnormal timing. In: S &P (2015)","DOI":"10.1109\/SP.2015.44"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Bhattacharyya, A., et al.: SmoTherSpectre: exploiting speculative execution through port contention. In: CCS (2019)","DOI":"10.1145\/3319535.3363194"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Brengel, M., Backes, M., Rossow, C.: Detecting hardware-assisted virtualization. In: DIMVA (2016)","DOI":"10.1007\/978-3-319-40667-1_11"},{"key":"11_CR7","unstructured":"Bugzilla: Check crossoriginisolated for all nsrfpservice::reducetimeprecision* callers. https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=1586761. Accessed 20 May 2022"},{"key":"11_CR8","unstructured":"contributors, M.: Cross-origin-embedder-policy. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/HTTP\/Headers\/Cross-Origin-Embedder-Policy. Accessed 19 Nov 2021"},{"key":"11_CR9","unstructured":"contributors, M.: Cross-origin-opener-policy. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/HTTP\/Headers\/Cross-Origin-Opener-Policy. Accessed 19 Nov 2021"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Crane, S., Homescu, A., Brunthaler, S., Larsen, P., Franz, M.: Thwarting cache side-channel attacks through dynamic software diversity. In: NDSS (2015)","DOI":"10.14722\/ndss.2015.23264"},{"key":"11_CR11","unstructured":"Easdon, C., Schwarz, M., Schwarzl, M., Gruss, D.: Rapid prototyping for microarchitectural attacks. In: USENIX Security Symposium (2022)"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Eckersley, P.: How unique is your web browser? In: Privacy Enhancing Technologies (2010)","DOI":"10.1007\/978-3-642-14527-8_1"},{"key":"11_CR13","unstructured":"Giorgio Maone: NoScript\u2013JavaScript\/Java\/Flash blocker for a safer Firefox experience!, July 2017. https:\/\/noscript.net"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Gras, B., Giuffrida, C., Kurth, M., Bos, H., Razavi, K.: Absynthe: automatic blackbox side-channel synthesis on commodity microarchitectures. In: NDSS (2020)","DOI":"10.14722\/ndss.2020.23018"},{"key":"11_CR15","unstructured":"Gras, B., Razavi, K., Bos, H., Giuffrida, C.: Translation leak-aside buffer: defeating cache side-channel protections with TLB attacks. In: USENIX (2018)"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Gras, B., Razavi, K., Bosman, E., Bos, H., Giuffrida, C.: ASLR on the line: practical cache attacks on the MMU. In: NDSS (2017)","DOI":"10.14722\/ndss.2017.23271"},{"key":"11_CR17","unstructured":"Group, W.C.: Index of instructions webassembly 2.0. https:\/\/webassembly.github.io\/spec\/core\/appendix\/index-instructions.html. Accessed 20 May 2022"},{"key":"11_CR18","unstructured":"Group, W.C.: Security\u2013webassembly. https:\/\/webassembly.org\/docs\/security\/. Accessed 20 May 2022"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Gruss, D., Maurice, C., Wagner, K., Mangard, S.: Flush+Flush: a fast and stealthy cache attack. In: DIMVA (2016)","DOI":"10.1007\/978-3-319-40667-1_14"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Gruss, D., Maurice, C., Mangard, S.: Rowhammer.js: a remote software-induced fault attack in javascript. In: DIMVA (2016)","DOI":"10.1007\/978-3-319-40667-1_15"},{"key":"11_CR21","unstructured":"Hat, R.: Disabling smt to prevent cpu security issues using the web console. https:\/\/access.redhat.com\/documentation\/en-us\/red-hat-enterprise-linux\/8\/topic\/f1d65124-781b-4543-a51a-d2bf9fa794ac. Accessed 10 May 2022"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Irazoqui, G., Eisenbarth, T., Sunar, B.: MASCAT: preventing microarchitectural attacks before distribution. In: CODASPY (2018)","DOI":"10.1145\/3176258.3176316"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Kocher, P., et al.: Spectre attacks: exploiting speculative execution. In: S &P (2019)","DOI":"10.1109\/SP.2019.00002"},{"key":"11_CR24","unstructured":"Kohlbrenner, D., Shacham, H.: Trusted browsers for uncertain times. In: USENIX Security Symposium (2016)"},{"key":"11_CR25","unstructured":"Kruegel, C.: Full system emulation: achieving successful automated dynamic analysis of evasive malware. In: BlackHat USA (2014)"},{"key":"11_CR26","doi-asserted-by":"crossref","unstructured":"Laor, T., et al.: DRAWNAPART: a device identification technique based on remote GPU fingerprinting. In: NDSS (2022)","DOI":"10.14722\/ndss.2022.24093"},{"key":"11_CR27","doi-asserted-by":"crossref","unstructured":"Laperdrix, P., Avoine, G., Baudry, B., Nikiforakis, N.: Morellian analysis for browsers: making web authentication stronger with canvas fingerprinting. In: DIMVA (2019)","DOI":"10.1007\/978-3-030-22038-9_3"},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"Laperdrix, P., Bielova, N., Baudry, B., Avoine, G.: Browser fingerprinting: a survey. ACM Trans. Web 14(2), 8:1\u20138:33 (2020)","DOI":"10.1145\/3386040"},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"Laperdrix, P., Rudametkin, W., Baudry, B.: Beauty and the beast: diverting modern web browsers to build unique browser fingerprints. In: S &P (2016)","DOI":"10.1109\/SP.2016.57"},{"key":"11_CR30","unstructured":"Laperdrix, P., Starov, O., Chen, Q., Kapravelos, A., Nikiforakis, N.: Fingerprinting in style: detecting browser extensions via injected style sheets. In: USENIX Security Symposium (2021)"},{"key":"11_CR31","doi-asserted-by":"crossref","unstructured":"Lipp, M., Had\u017ei\u0107, V., Schwarz, M., Perais, A., Maurice, C., Gruss, D.: Take a way: exploring the security implications of AMD\u2019s cache way predictors. In: AsiaCCS (2020)","DOI":"10.1145\/3320269.3384746"},{"key":"11_CR32","doi-asserted-by":"crossref","unstructured":"Liu, C., White, R.W., Dumais, S.T.: Understanding web browsing behaviors through weibull analysis of dwell time. In: SIGIR (2010)","DOI":"10.1145\/1835449.1835513"},{"key":"11_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/978-3-319-42836-9_44","volume-title":"Wireless Algorithms, Systems, and Applications","author":"J Mao","year":"2016","unstructured":"Mao, J., Chen, Y., Shi, F., Jia, Y., Liang, Z.: Toward exposing timing-based probing attacks in web applications. In: Yang, Q., Yu, W., Challal, Y. (eds.) WASA 2016. LNCS, vol. 9798, pp. 499\u2013510. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-42836-9_44"},{"key":"11_CR34","doi-asserted-by":"crossref","unstructured":"Oren, Y., Kemerlis, V.P., Sethumadhavan, S., Keromytis, A.D.: The spy in the sandbox: practical cache attacks in javascript and their implications. In: CCS (2015)","DOI":"10.1145\/2810103.2813708"},{"key":"11_CR35","doi-asserted-by":"crossref","unstructured":"Payer, M.: HexPADS: a platform to detect stealth attacks. In: ESSoS (2016)","DOI":"10.1007\/978-3-319-30806-7_9"},{"key":"11_CR36","unstructured":"Rane, A., Lin, C., Tiwari, M.: Raccoon: closing digital $$\\{$$Side-Channels$$\\}$$ through obfuscated execution. In: USENIX Security Symposium (2015)"},{"key":"11_CR37","unstructured":"Raymond Hill: uBlock Origin\u2013An efficient blocker for Chromium and Firefox. Fast and lean, July 2017. https:\/\/github.com\/gorhill\/uBlock"},{"key":"11_CR38","doi-asserted-by":"crossref","unstructured":"Ren, X., Moody, L., Taram, M., Jordan, M., Tullsen, D.M., Venkat, A.: I see dead $$\\mu $$ops: leaking secrets via intel\/amd micro-op caches. In: ISCA (2021)","DOI":"10.1109\/ISCA52012.2021.00036"},{"key":"11_CR39","doi-asserted-by":"crossref","unstructured":"Rokicki, T., Maurice, C., Laperdrix, P.: SoK: in search of lost time: a review of JavaScript timers in browsers. In: EuroS &P (2021)","DOI":"10.1109\/EuroSP51992.2021.00039"},{"key":"11_CR40","doi-asserted-by":"crossref","unstructured":"Rokicki, T., Maurice, C., Botvinnik, M., Oren, Y.: Port contention goes portable: port contention side channels in web browsers. In: ASIACCS (2022)","DOI":"10.1145\/3488932.3517411"},{"key":"11_CR41","unstructured":"S\u00e1nchez-Rola, I., Santos, I., Balzarotti, D.: Extension breakdown: security analysis of browsers extension resources control policies. In: USENIX Security Symposium (2017)"},{"key":"11_CR42","doi-asserted-by":"crossref","unstructured":"S\u00e1nchez-Rola, I., Santos, I., Balzarotti, D.: Clock around the clock: time-based device fingerprinting. In: CCS (2018)","DOI":"10.1145\/3243734.3243796"},{"key":"11_CR43","doi-asserted-by":"crossref","unstructured":"Van Schaik, S., et al.: RIDL: rogue in-flight data load. In: S &P (2019)","DOI":"10.1109\/SP.2019.00087"},{"key":"11_CR44","doi-asserted-by":"crossref","unstructured":"Schwarz, M., Lackner, F., Gruss, D.: JavaScript template attacks: automatically inferring host information for targeted exploits. In: NDSS (2019)","DOI":"10.14722\/ndss.2019.23155"},{"key":"11_CR45","doi-asserted-by":"crossref","unstructured":"Schwarz, M., Lipp, M., Gruss, D.: JavaScript zero: real JavaScript and zero side-channel attacks. In: NDSS (2018)","DOI":"10.14722\/ndss.2018.23094"},{"key":"11_CR46","doi-asserted-by":"crossref","unstructured":"Schwarz, M., Maurice, C., Gruss, D., Mangard, S.: Fantastic timers and where to find them: high-resolution microarchitectural attacks in JavaScript. In: International Conference on Financial Cryptography and Data Security (2017)","DOI":"10.1007\/978-3-319-70972-7_13"},{"key":"11_CR47","unstructured":"Schwarzl, M., et al.: Dynamic process isolation. arXiv:2110.04751 (2021)"},{"key":"11_CR48","doi-asserted-by":"crossref","unstructured":"Shusterman, A., et al.: Robust website fingerprinting through the cache occupancy channel. In: USENIX Security Symposium (2019)","DOI":"10.1109\/TDSC.2020.2988369"},{"key":"11_CR49","doi-asserted-by":"crossref","unstructured":"Starov, O., Laperdrix, P., Kapravelos, A., Nikiforakis, N.: Unnecessarily identifiable: quantifying the fingerprintability of browser extensions due to bloat. In: WWW (2019)","DOI":"10.1145\/3308558.3313458"},{"key":"11_CR50","unstructured":"Stone, P.: Pixel perfect timing attacks with HTML5 (2013)"},{"key":"11_CR51","unstructured":"Taram, M., Ren, X., Venkat, A., Tullsen, D.: SecSMT: securing SMT processors against contention-based covert channels. In: USENIX Security Symposium (2022)"},{"key":"11_CR52","doi-asserted-by":"crossref","unstructured":"Townley, D., Ponomarev, D.: SMT-COP: defeating side-channel attacks on execution units in SMT processors. In: PACT (2019)","DOI":"10.1109\/PACT.2019.00012"},{"key":"11_CR53","doi-asserted-by":"crossref","unstructured":"Vastel, A., Laperdrix, P., Rudametkin, W., Rouvoy, R.: FP-STALKER: tracking browser fingerprint evolutions. In: S &P (2018)","DOI":"10.1109\/SP.2018.00008"},{"key":"11_CR54","unstructured":"W3C: Webassembly. https:\/\/webassembly.org\/. Accessed 20 May 2022"},{"key":"11_CR55","unstructured":"WikiChip: Sunny cove\u2013microarchitectures\u2013intel\u2013wikichip. https:\/\/en.wikichip.org\/wiki\/intel\/microarchitectures\/sunny_cove. Accessed 20 May 2022"},{"key":"11_CR56","unstructured":"Yarom, Y., Falkner, K.: FLUSH+RELOAD: a high resolution, low noise, L3 cache side-channel attack. In: USENIX Security Symposium (2014)"},{"key":"11_CR57","doi-asserted-by":"crossref","unstructured":"Yarom, Y., Genkin, D., Heninger, N.: CacheBleed: a timing attack on OpenSSL constant time RSA. In: CHES (2016)","DOI":"10.1007\/978-3-662-53140-2_17"},{"key":"11_CR58","doi-asserted-by":"crossref","unstructured":"Yasin, A.: A top-down method for performance analysis and counters architecture. In: IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS) (2014)","DOI":"10.1109\/ISPASS.2014.6844459"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2022"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-17143-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T04:05:49Z","timestamp":1663905949000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-17143-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031171420","9783031171437"],"references-count":58,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-17143-7_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"24 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2022.compute.dtu.dk\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"562","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"104","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}