{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:52:00Z","timestamp":1759092720718,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,8,17]],"date-time":"2012-08-17T00:00:00Z","timestamp":1345161600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,8,17]]},"DOI":"10.1145\/2490428.2490436","type":"proceedings-article","created":{"date-parts":[[2013,6,5]],"date-time":"2013-06-05T12:10:07Z","timestamp":1370434207000},"page":"57-62","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Implementing side-channel attacks on suggest boxes in web applications"],"prefix":"10.1145","author":[{"given":"Sampreet A.","family":"Sharma","sequence":"first","affiliation":[{"name":"IIT-Bombay, Powai, Mumbai, India"}]},{"given":"Bernard L.","family":"Menezes","sequence":"additional","affiliation":[{"name":"IIT-Bombay, Powai, Mumbai, India"}]}],"member":"320","published-online":{"date-parts":[[2012,8,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"volume-title":"10th USENIX Security Symposium","year":"2001","author":"Song Dawn","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.21"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.31"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.20"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866374"},{"key":"e_1_3_2_1_7_1","unstructured":"http:\/\/www.broadcom.com\/docs\/linux_sta\/README.txt  http:\/\/www.broadcom.com\/docs\/linux_sta\/README.txt"},{"key":"e_1_3_2_1_8_1","unstructured":"https:\/\/help.ubuntu.com\/community\/WifiDocs\/Driver\/bcm43xx#Installing%20STA%20drivers  https:\/\/help.ubuntu.com\/community\/WifiDocs\/Driver\/bcm43xx#Installing%20STA%20drivers"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-009-9049-y"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_16"},{"key":"e_1_3_2_1_11_1","unstructured":"D. Brumley and D. Boneh. \"Remote timing attacks are practical \" the 12th Usenix Security Symposium 2003   D. Brumley and D. Boneh. \"Remote timing attacks are practical \" the 12th Usenix Security Symposium 2003"},{"volume-title":"10th USENIX Security Symposium","year":"2001","author":"Song Dawn","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","unstructured":"http:\/\/www.wireshark.org  http:\/\/www.wireshark.org"},{"key":"e_1_3_2_1_14_1","unstructured":"http:\/\/www.ubuntu.com  http:\/\/www.ubuntu.com"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_9"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/367390.367400"}],"event":{"name":"SECURIT '12: First International Conference on Security of Internet of Things","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","TCG Trusted Computing Group","Amrita Amrita Vishwa Vidyapeetham","CSA Computer Science Association"],"location":"Kollam India","acronym":"SECURIT '12"},"container-title":["Proceedings of the First International Conference on Security of Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2490428.2490436","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2490428.2490436","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:35Z","timestamp":1750232075000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2490428.2490436"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8,17]]},"references-count":17,"alternative-id":["10.1145\/2490428.2490436","10.1145\/2490428"],"URL":"https:\/\/doi.org\/10.1145\/2490428.2490436","relation":{},"subject":[],"published":{"date-parts":[[2012,8,17]]},"assertion":[{"value":"2012-08-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}