{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:35:10Z","timestamp":1773246910790,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Office of Naval Research (ONR)","award":["N00014-12-1-0166"],"award-info":[{"award-number":["N00014-12-1-0166"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2810103.2813708","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"1406-1418","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":191,"title":["The Spy in the Sandbox"],"prefix":"10.1145","author":[{"given":"Yossef","family":"Oren","sequence":"first","affiliation":[{"name":"Columbia University, New York, NY, USA"}]},{"given":"Vasileios P.","family":"Kemerlis","sequence":"additional","affiliation":[{"name":"Columbia University, New York, NY, USA"}]},{"given":"Simha","family":"Sethumadhavan","sequence":"additional","affiliation":[{"name":"Columbia University, New York, NY, USA"}]},{"given":"Angelos D.","family":"Keromytis","sequence":"additional","affiliation":[{"name":"Columbia University, New York, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314466.1314469"},{"key":"e_1_3_2_1_2_1","first-page":"299","volume-title":"Cross-VM Attack on AES. In Proc. of RAID","author":"Apecechea G. I.","year":"2014","unstructured":"G. I. Apecechea , M. S. Inci , T. Eisenbarth , and B. Sunar . Wait a Minute! A fast , Cross-VM Attack on AES. In Proc. of RAID , pages 299 -- 319 , 2014 . G. I. Apecechea, M. S. Inci, T. Eisenbarth, and B. Sunar. Wait a Minute! A fast, Cross-VM Attack on AES. In Proc. of RAID, pages 299--319, 2014."},{"key":"e_1_3_2_1_3_1","unstructured":"D. J. Bernstein. Cache-timing attacks on AES. http:\/\/cr.yp.to\/papers.html#cachetiming April 2005. {Online; accessed August-2015}.  D. J. Bernstein. Cache-timing attacks on AES. http:\/\/cr.yp.to\/papers.html#cachetiming April 2005. {Online; accessed August-2015}."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251353.1251354"},{"key":"e_1_3_2_1_5_1","unstructured":"Ecma International. Standard ECMA-262: ECMAScript\u00ae Language Specification. http:\/\/www.ecma-international.org\/ecma-262\/5.1\/index.html June 2011. {Online; accessed August-2015}.  Ecma International. Standard ECMA-262: ECMAScript\u00ae Language Specification. http:\/\/www.ecma-international.org\/ecma-262\/5.1\/index.html June 2011. {Online; accessed August-2015}."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85174-5_12"},{"key":"e_1_3_2_1_7_1","volume-title":"July","author":"Herman D.","year":"2013","unstructured":"D. Herman and K. Russell . Typed Array Specification. https:\/\/www.khronos.org\/registry\/typedarray\/specs\/latest\/ , July 2013 . {Online; accessed August-2015}. D. Herman and K. Russell. Typed Array Specification. https:\/\/www.khronos.org\/registry\/typedarray\/specs\/latest\/, July 2013. {Online; accessed August-2015}."},{"key":"e_1_3_2_1_8_1","volume-title":"Proc. of WOOT","author":"Ho G.","year":"2014","unstructured":"G. Ho , D. Boneh , L. Ballard , and N. Provos . Tick Tock: Building Browser Red Pills from Timing Side Channels . In Proc. of WOOT , 2014 . G. Ho, D. Boneh, L. Ballard, and N. Provos. Tick Tock: Building Browser Red Pills from Timing Side Channels. In Proc. of WOOT, 2014."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/882488.884165"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.23"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.19"},{"key":"e_1_3_2_1_12_1","first-page":"957","volume-title":"Proc. of USENIX Sec","author":"Kemerlis V. P.","year":"2014","unstructured":"V. P. Kemerlis , M. Polychronakis , and A. D. Keromytis . ret2dir: Rethinking Kernel Isolation . In Proc. of USENIX Sec , pages 957 -- 972 , 2014 . V. P. Kemerlis, M. Polychronakis, and A. D. Keromytis. ret2dir: Rethinking Kernel Isolation. In Proc. of USENIX Sec, pages 957--972, 2014."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/646761.706156"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"e_1_3_2_1_15_1","volume-title":"Power Analysis Attacks: Revealing the Secrets of Smart Cards","author":"Mangard S.","year":"2007","unstructured":"S. Mangard , E. Oswald , and T. Popp . Power Analysis Attacks: Revealing the Secrets of Smart Cards . Springer , 2007 . S. Mangard, E. Oswald, and T. Popp. Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer, 2007."},{"key":"e_1_3_2_1_16_1","unstructured":"J. Mann. High Resolution Time. http:\/\/www.w3.org\/TR\/hr-time\/ December 2012. {Online; accessed August-2015}.  J. Mann. High Resolution Time. http:\/\/www.w3.org\/TR\/hr-time\/ December 2012. {Online; accessed August-2015}."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20550-2_3"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881511.1881550"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/2044928.2044947"},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. of BSDCan","author":"Percival C.","year":"2005","unstructured":"C. Percival . Cache Missing for Fun and Profit . In Proc. of BSDCan , 2005 . C. Percival. Cache Missing for Fun and Profit. In Proc. of BSDCan, 2005."},{"key":"e_1_3_2_1_22_1","first-page":"1","volume-title":"Proc. of USENIX Sec.","author":"Provos N.","year":"2008","unstructured":"N. Provos , P. Mavrommatis , M. A. Rajab , and F. Monrose . All Your iFRAMEs Point to Us . In Proc. of USENIX Sec. , pages 1 -- 15 , 2008 . N. Provos, P. Mavrommatis, M. A. Rajab, and F. Monrose. All Your iFRAMEs Point to Us. In Proc. of USENIX Sec., pages 1--15, 2008."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250662.1250709"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"e_1_3_2_1_25_1","volume-title":"March","author":"Shutemov K. A.","year":"2015","unstructured":"K. A. Shutemov . pagemap: do not leak physical addresses to non-privileged userspace. https:\/\/lwn.net\/Articles\/642074\/ , March 2015 . {Online; accessed August-2015}. K. A. Shutemov. pagemap: do not leak physical addresses to non-privileged userspace. https:\/\/lwn.net\/Articles\/642074\/, March 2015. {Online; accessed August-2015}."},{"key":"e_1_3_2_1_26_1","volume-title":"January","year":"2015","unstructured":"StatCounter. GlobalStats. http:\/\/gs.statcounter.com , January 2015 . {Online; accessed August-2015}. StatCounter. GlobalStats. http:\/\/gs.statcounter.com, January 2015. {Online; accessed August-2015}."},{"key":"e_1_3_2_1_27_1","volume-title":"http:\/\/www.w3.org\/standards\/techs\/js. {Online","author":"Is Current Status C.","year":"2015","unstructured":"W3 C. Javascript AP Is Current Status . http:\/\/www.w3.org\/standards\/techs\/js. {Online ; accessed August- 2015 }. W3C. Javascript APIs Current Status. http:\/\/www.w3.org\/standards\/techs\/js. {Online; accessed August-2015}."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1813084.1813102"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382230"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660356"}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","location":"Denver Colorado USA","acronym":"CCS'15","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813708","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2813708","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:25Z","timestamp":1750225705000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813708"}},"subtitle":["Practical Cache Attacks in JavaScript and their Implications"],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":30,"alternative-id":["10.1145\/2810103.2813708","10.1145\/2810103"],"URL":"https:\/\/doi.org\/10.1145\/2810103.2813708","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}