{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T23:25:00Z","timestamp":1771457100160,"version":"3.50.1"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319698106","type":"print"},{"value":"9783319698113","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,11,2]],"date-time":"2017-11-02T00:00:00Z","timestamp":1509580800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-69811-3_36","type":"book-chapter","created":{"date-parts":[[2017,11,1]],"date-time":"2017-11-01T00:08:02Z","timestamp":1509494882000},"page":"392-403","source":"Crossref","is-referenced-by-count":7,"title":["Web Browser Tampering: Inspecting CPU Features from Side-Channel Information"],"prefix":"10.1007","author":[{"given":"Takamichi","family":"Saito","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Koki","family":"Yasuda","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kazuhisa","family":"Tanabe","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kazushi","family":"Takahashi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,11,2]]},"reference":[{"key":"36_CR1","unstructured":"Anderson, R., Kuhn, M..: Tamper resistance a cautionary note. In: 2nd USENIX Workshop on Electronic Commerce (1996)"},{"key":"36_CR2","unstructured":"Kommerling, O., Kuhn, M.: Design principles for tamper-resistant smartcard processors. In: USENIX Workshop on Smartcard Technology (1999)"},{"key":"36_CR3","doi-asserted-by":"crossref","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Advances in Cryptology: Proceedings of Eurocrypt 1997, pp. 37\u201351. Springer (1997)","DOI":"10.1007\/3-540-69053-0_4"},{"key":"36_CR4","doi-asserted-by":"crossref","unstructured":"Eckersley, P.: How unique is your Web browser? In: Proceedings of Privacy Enhancing Technologies Symposium. LNCS, vol. 6205 (2010)","DOI":"10.1007\/978-3-642-14527-8_1"},{"key":"36_CR5","doi-asserted-by":"crossref","unstructured":"Kocher, P.C.: Timing attacks on implementations of die-hellman, RSA, DSS, and other systems. In: Advances in Cryptology: Proceedings of CRYPTO 1996, pp. 104\u2013113. Springer (1996)","DOI":"10.1007\/3-540-68697-5_9"},{"key":"36_CR6","unstructured":"Brumley, D., Boneh, D.: Remote timing attacks are practical. In: USENIX Security Symposium, August 2003"},{"key":"36_CR7","unstructured":"Mowery, K., Bogenreif, D., Yilek, S., Shacham, H.: Fingerprinting information in JavaScript implementations. In: Proceedings of Web 2.0 Workshop on Security and Privacy (W2SP) (2011)"},{"key":"36_CR8","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jae, J., Jun, B.: Differential power analysis. In: Advances in Cryptology: Proceedings of CRYPTO 1999, pp. 388\u2013397. Springer (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"2","key":"36_CR9","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1109\/TDSC.2005.26","volume":"2","author":"T Kohno","year":"2005","unstructured":"Kohno, T., Broido, A., Claffy, K.: Remote physical device fingerprinting. IEEE Trans. Dependable Secur. Comput. 2(2), 93\u2013108 (2005)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"36_CR10","unstructured":"Mowery, K., Shacham, H.: Pixel perfect: fingerprinting canvas in HTML5. In: Proceedings of Web 2.0 Security and Privacy (W2SP) (2012)"},{"key":"36_CR11","unstructured":"Bojinov, H., Michalevsky, Y., Nakibly, G., Boneh, D.: Mobile Device Identification via Sensor Fingerprinting, arXiv:1408.1416 [cs.CR] (2014)"},{"key":"36_CR12","doi-asserted-by":"crossref","unstructured":"Felten, E., Schneider, M.: Timing attacks on Web privacy. In: Proceedings of 7th ACM Conference on Computer and Communications Security, pp. 25\u201332 (2000)","DOI":"10.1145\/352600.352606"},{"key":"36_CR13","unstructured":"Krovetz, T., Dai, W.: How to get fast AES calls?, Crypto++ user group, Retrieved 2010\u201308-11"},{"key":"36_CR14","doi-asserted-by":"crossref","unstructured":"Nikiforakis, N., Kapravelos, A., Joosen, W., Kruegel, C., Piessens, F., Vigna, G.: Cookieless monster: exploring the ecosystem of Web-based device fingerprinting. In: Proceedings of 34th IEEE Symposium of Security and Privacy (IEEE S&P 2013) (2013)","DOI":"10.1109\/SP.2013.43"},{"key":"36_CR15","unstructured":"Nikiforakis, N., Joosen, W., Livshits, B.: PriVaricator: deceiving fingerprinters with little white lies. http:\/\/research.microsoft.com\/apps\/pubs\/default.aspx?id=209989"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on Broad-Band Wireless Computing, Communication and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-69811-3_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T08:05:50Z","timestamp":1570262750000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-69811-3_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,2]]},"ISBN":["9783319698106","9783319698113"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-69811-3_36","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"value":"2367-4512","type":"print"},{"value":"2367-4520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,11,2]]}}}