{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:16:55Z","timestamp":1755839815932,"version":"3.40.3"},"publisher-location":"Cham","reference-count":50,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031786754"},{"type":"electronic","value":"9783031786761"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-78676-1_21","type":"book-chapter","created":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T06:49:01Z","timestamp":1740120541000},"page":"365-383","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Remote Scheduler Contention Attacks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-1229-3962","authenticated-orcid":false,"given":"Stefan","family":"Gast","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-0569-1704","authenticated-orcid":false,"given":"Jonas","family":"Juffinger","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-1771-0064","authenticated-orcid":false,"given":"Lukas","family":"Maar","sequence":"additional","affiliation":[]},{"given":"Christoph","family":"Royer","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0003-7314-9033","authenticated-orcid":false,"given":"Andreas","family":"Kogler","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7977-3246","authenticated-orcid":false,"given":"Daniel","family":"Gruss","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,22]]},"reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Abel, A., Reineke, J.: uops.info: Characterizing latency, throughput, and port usage of instructions on intel microarchitectures. In: ASPLOS (2019)","DOI":"10.1145\/3297858.3304062"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Abel, A., Reineke, J.: nanoBench: a low-overhead tool for running microbenchmarks on x86 systems. In: ISPASS (2020)","DOI":"10.1109\/ISPASS48437.2020.00014"},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Aldaya, A.C., Brumley, B.B., ul\u00a0Hassan, S., Garc\u00eda, C.P., Tuveri, N.: Port contention for fun and profit. In: S &P (2018)","DOI":"10.1109\/SP.2019.00066"},{"key":"21_CR4","unstructured":"AMD: Software Optimization Guide for AMD EPYC 7002 Processors (2020)"},{"key":"21_CR5","unstructured":"AMD: Software Optimization Guide for AMD EPYC 7003 Processors (11 2020)"},{"key":"21_CR6","unstructured":"AMD: Where Gaming Begins: AMD Ryzen 5000 Series (2020). https:\/\/www.slideshare.net\/AMD\/amd-where-gaming-begins-239086719"},{"key":"21_CR7","unstructured":"AMD: Execution Unit Scheduler Contention Side-Channel Vulnerability on AMD Processors (2022). https:\/\/www.amd.com\/en\/resources\/product-security\/bulletin\/amd-sb-1039.html"},{"key":"21_CR8","unstructured":"AMD: Software Optimization Guide for the AMD Zen4 Microarchitecture (2023)"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Bhattacharyya, A., et al.: SMoTherSpectre: exploiting speculative execution through port contention. In: CCS (2019)","DOI":"10.1145\/3319535.3363194"},{"key":"21_CR10","unstructured":"Christensen, A.: Reduce resolution of performance.now (2015). https:\/\/bugs.webkit.org\/show_bug.cgi?id=146531"},{"key":"21_CR11","unstructured":"Chromium: window.performance.now does not support sub-millisecond precision on Windows (2015). https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=158234#c110"},{"key":"21_CR12","unstructured":"Cutress, I.: Investigating Performance of Multi-Threading on Zen 3 and AMD Ryzen 5000 (2020). https:\/\/www.anandtech.com\/show\/16261\/investigating-performance-of-multithreading-on-zen-3-and-amd-ryzen-5000\/2"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Dipta, D.R., Gulmezoglu, B.: DF-SCA: dynamic frequency side channel attacks are practical. In: ACSAC (2022)","DOI":"10.1145\/3564625.3567979"},{"key":"21_CR14","unstructured":"Faggioli, D.: Re: [RFC PATCH v3 00\/16] Core scheduling v3 (2019). https:\/\/lore.kernel.org\/lkml\/277737d6034b3da072d3b0b808d2fa6e110038b0.camel@suse.com\/"},{"key":"21_CR15","unstructured":"Fog, A.: The microarchitecture of Intel, AMD, and VIA CPUs: an optimization guide for assembly programmers and compiler makers (2021). https:\/\/www.agner.org\/optimize\/microarchitecture.pdf"},{"key":"21_CR16","unstructured":"Gast, S., Juffinger, J., Maar, L., Royer, C., Kogler, A., Gruss, D.: Remote scheduler contention attacks (extended version) (2024). arXiv:2404.07042"},{"key":"21_CR17","doi-asserted-by":"crossref","unstructured":"Gast, S., et al.: SQUIP: exploiting the scheduler queue contention side channel. In: S &P (2023)","DOI":"10.1109\/SP46215.2023.10179368"},{"key":"21_CR18","doi-asserted-by":"crossref","unstructured":"Gras, B., Razavi, K., Bosman, E., Bos, H., Giuffrida, C.: ASLR on the line: practical cache attacks on the MMU. In: NDSS (2017)","DOI":"10.14722\/ndss.2017.23271"},{"key":"21_CR19","unstructured":"Gruss, D., Spreitzer, R., Mangard, S.: Cache template attacks: automating attacks on inclusive last-level caches. In: USENIX Security (2015)"},{"key":"21_CR20","unstructured":"Herman, D., Wagner, L., Zakai, A.: asm.js: Working Draft \u2013 18 August 2014 (2014). http:\/\/asmjs.org\/spec\/latest\/"},{"key":"21_CR21","unstructured":"Intel: Intel 64 and IA-32 Architectures Optimization Reference Manual (2019)"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Jana, S., Shmatikov, V.: Memento: learning secrets from process footprints. In: S &P (2012)","DOI":"10.1109\/SP.2012.19"},{"key":"21_CR23","unstructured":"Johnson, D.: And a little more... big changes to the LDQ\/STQ sizes, and new \u2019coalescing retire queue\u2019 theory and sizes (2021). https:\/\/twitter.com\/dougallj\/status\/1373973478731255812"},{"key":"21_CR24","unstructured":"Kohlbrenner, D., Shacham, H.: Trusted browsers for uncertain times. In: USENIX Security (2016)"},{"key":"21_CR25","doi-asserted-by":"crossref","unstructured":"Lipp, M., Gruss, D., Schwarz, M., Bidner, D., Maurice, C.M.T.N., Mangard, S.: Practical keystroke timing attacks in sandboxed javascript. In: ESORICS (2017)","DOI":"10.1007\/978-3-319-66399-9_11"},{"key":"21_CR26","unstructured":"Mozilla: SharedArrayBuffer (2012). https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/JavaScript\/Reference\/Global_Objects\/SharedArrayBuffer"},{"key":"21_CR27","unstructured":"Mozilla: asm.js - Game development | MDN (2023). https:\/\/developer.mozilla.org\/en-US\/docs\/Games\/Tools\/asm.js"},{"key":"21_CR28","unstructured":"Mozilla: Number - JavaScript | MDN (2023). https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/JavaScript\/Reference\/Global_Objects\/Number"},{"key":"21_CR29","unstructured":"Mozilla: Using Web Workers - Web APIs | MDN (2023). https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/API\/Web_Workers_API\/Using_web_workers"},{"key":"21_CR30","doi-asserted-by":"crossref","unstructured":"Oren, Y., Kemerlis, V.P., Sethumadhavan, S., Keromytis, A.D.: The spy in the sandbox: practical cache attacks in javascript and their implications. In: CCS (2015)","DOI":"10.1145\/2810103.2813708"},{"key":"21_CR31","unstructured":"Pessl, P., Gruss, D., Maurice, C., Schwarz, M., Mangard, S.: DRAMA: exploiting DRAM addressing for cross-CPU attacks. In: USENIX Security (2016)"},{"issue":"6","key":"21_CR32","doi-asserted-by":"publisher","first-page":"1898","DOI":"10.3758\/s13423-016-1044-3","volume":"23","author":"S Pinet","year":"2016","unstructured":"Pinet, S., Ziegler, J.C., Alario, F.X.: Typing is writing: linguistic properties modulate typing execution. Psychon. Bull. Rev. 23(6), 1898\u20131906 (2016)","journal-title":"Psychon. Bull. Rev."},{"key":"21_CR33","doi-asserted-by":"crossref","unstructured":"Purnal, A., Bognar, M., Piessens, F., Verbauwhede, I.: ShowTime: amplifying arbitrary CPU timing side channels. In: AsiaCCS (2023)","DOI":"10.1145\/3579856.3590332"},{"key":"21_CR34","doi-asserted-by":"crossref","unstructured":"Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: CCS (2009)","DOI":"10.1145\/1653662.1653687"},{"key":"21_CR35","doi-asserted-by":"crossref","unstructured":"Rokicki, T., Maurice, C., Botvinnik, M., Oren, Y.: Port contention goes portable: port contention side channels in web browsers. In: AsiaCCS (2022)","DOI":"10.1145\/3488932.3517411"},{"key":"21_CR36","doi-asserted-by":"crossref","unstructured":"Rushanan, M., Russel, D., Rubin, A.D.: MalloryWorker: stealthy computation and covert channels using web workers. In: International Workshop on Security and Trust Management (2016)","DOI":"10.1007\/978-3-319-46598-2_14"},{"key":"21_CR37","doi-asserted-by":"crossref","unstructured":"van Schaik, S., et al.: RIDL: rogue in-flight data load. In: S &P (2019)","DOI":"10.1109\/SP.2019.00087"},{"key":"21_CR38","doi-asserted-by":"crossref","unstructured":"Schwarz, M., et al.: KeyDrown: eliminating software-based keystroke timing side-channel attacks. In: NDSS (2018)","DOI":"10.14722\/ndss.2018.23027"},{"key":"21_CR39","doi-asserted-by":"crossref","unstructured":"Schwarz, M., Maurice, C., Gruss, D., Mangard, S.: Fantastic timers and where to find them: high-resolution microarchitectural attacks in JavaScript. In: FC (2017)","DOI":"10.1007\/978-3-319-70972-7_13"},{"key":"21_CR40","unstructured":"Shusterman, A., Agarwal, A., O\u2019Connell, S., Genkin, D., Oren, Y., Yarom, Y.: Prime+probe 1, javascript 0: overcoming browser-based side-channel defenses. In: USENIX Security (2021)"},{"key":"21_CR41","doi-asserted-by":"crossref","unstructured":"Shusterman, A., et al.: Robust website fingerprinting through the cache occupancy channel. In: USENIX Security (2019)","DOI":"10.1109\/TDSC.2020.2988369"},{"key":"21_CR42","unstructured":"Song, D.X., Wagner, D., Tian, X.: Timing analysis of keystrokes and timing attacks on SSH. In: USENIX Security (2001)"},{"issue":"3","key":"21_CR43","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s41635-018-0046-1","volume":"3","author":"J Szefer","year":"2019","unstructured":"Szefer, J.: Survey of microarchitectural side and covert channels, attacks, and defenses. J. Hardware Syst. Secur. 3(3), 219\u2013234 (2019)","journal-title":"J. Hardware Syst. Secur."},{"key":"21_CR44","unstructured":"Taneja, H., Kim, J., Xu, J.J., van Schaik, S., Genkin, D., Yarom, Y.: Hot pixels: frequency, power, and temperature attacks on GPUs and ARM SoCs. In: USENIX Security (2023)"},{"key":"21_CR45","unstructured":"Van\u00a0Goethem, T., Joosen, W.: One side-channel to bring them all and in the darkness bind them: associating isolated browsing sessions. In: WOOT (2017)"},{"key":"21_CR46","unstructured":"Vila, P., K\u00f6pf, B.: Loophole: timing attacks on shared event loops in chrome. In: USENIX Security (2017)"},{"key":"21_CR47","unstructured":"W3C: High Resolution Time Level 2 (2016). https:\/\/www.w3.org\/TR\/hr-time\/"},{"key":"21_CR48","doi-asserted-by":"crossref","unstructured":"Weinberg, Z., Chen, E.Y., Jayaraman, P.R., Jackson, C.: I still know what you visited last summer: leaking browsing history via user interaction and side channel attacks. In: S &P (2011)","DOI":"10.1109\/SP.2011.23"},{"key":"21_CR49","unstructured":"Zbarsky, B.: Reduce resolution of performance.now. (2015). https:\/\/hg.mozilla.org\/integration\/mozilla-inbound\/rev\/48ae8b5e62ab"},{"key":"21_CR50","unstructured":"Zhang, K., Wang, X.: Peeping tom in the neighborhood: keystroke eavesdropping on multi-user systems. In: USENIX Security (2009)"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-78676-1_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T06:49:28Z","timestamp":1740120568000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-78676-1_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031786754","9783031786761"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-78676-1_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"22 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Willemstad","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cura\u00e7ao","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 March 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 March 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc24.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}