{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T07:12:56Z","timestamp":1763968376178,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Basque Government"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,9]]},"DOI":"10.1145\/3359789.3359803","type":"proceedings-article","created":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T18:41:59Z","timestamp":1574448119000},"page":"478-488","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["BakingTimer"],"prefix":"10.1145","author":[{"given":"Iskander","family":"Sanchez-Rola","sequence":"first","affiliation":[{"name":"University of Deusto"}]},{"given":"Davide","family":"Balzarotti","sequence":"additional","affiliation":[{"name":"EURECOM"}]},{"given":"Igor","family":"Santos","sequence":"additional","affiliation":[{"name":"University of Deusto"}]}],"member":"320","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1145\/2508859.2516674"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1145\/2382196.2382268"},{"unstructured":"Amazon Web Services. Alexa top sites. https:\/\/aws.amazon.com\/es\/alexatop-sites\/ 2018.  Amazon Web Services. Alexa top sites. https:\/\/aws.amazon.com\/es\/alexatop-sites\/ 2018.","key":"e_1_3_2_1_3_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1109\/SP.2012.25"},{"volume-title":"Proceedings of the Privacy Enhancing Technologies (PETS)","year":"2011","author":"Bilenko M.","key":"e_1_3_2_1_5_1"},{"unstructured":"Blocksi. Web content filtering. http:\/\/www.blocksi.net\/ 2018.  Blocksi. Web content filtering. http:\/\/www.blocksi.net\/ 2018.","key":"e_1_3_2_1_6_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/1242572.1242656"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.14722\/ndss.2017.23152"},{"unstructured":"ChromeDevTools. DevTools Protocol API. https:\/\/github.com\/ChromeDevTools\/debugger-protocol-viewer 2019.  ChromeDevTools. DevTools Protocol API. https:\/\/github.com\/ChromeDevTools\/debugger-protocol-viewer 2019.","key":"e_1_3_2_1_9_1"},{"unstructured":"Cisco Adaptive Security Appliance. CVE-2019-1713. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-1713 2019.  Cisco Adaptive Security Appliance. CVE-2019-1713. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-1713 2019.","key":"e_1_3_2_1_10_1"},{"unstructured":"Cloudacl. Web security service. http:\/\/www.cloudacl.com\/ 2018.  Cloudacl. Web security service. http:\/\/www.cloudacl.com\/ 2018.","key":"e_1_3_2_1_11_1"},{"unstructured":"Clover A. Css visited pages disclosure. BUGTRAQ mailing list posting (2002).  Clover A. Css visited pages disclosure. BUGTRAQ mailing list posting (2002).","key":"e_1_3_2_1_12_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/2976749.2978313"},{"unstructured":"Directive 2009\/136\/EC of the European Parliament and of the Council of 25 November 2009. Official Journal of the European Union (2009).  Directive 2009\/136\/EC of the European Parliament and of the Council of 25 November 2009. Official Journal of the European Union (2009).","key":"e_1_3_2_1_14_1"},{"unstructured":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation). Official Journal of the European Union (2016).  Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation). Official Journal of the European Union (2016).","key":"e_1_3_2_1_15_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1145\/352600.352606"},{"unstructured":"Fortinet. Fortiguard web filtering. http:\/\/www.fortiguard.com\/ 2018.  Fortinet. Fortiguard web filtering. http:\/\/www.fortiguard.com\/ 2018.","key":"e_1_3_2_1_17_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1109\/SP.2011.37"},{"unstructured":"Google. Leak of visited status of page in blink. https:\/\/chromereleases.googleblog.com\/2018\/05\/stable-channel-update-for-desktop_58.html 2018.  Google. Leak of visited status of page in blink. https:\/\/chromereleases.googleblog.com\/2018\/05\/stable-channel-update-for-desktop_58.html 2018.","key":"e_1_3_2_1_19_1"},{"unstructured":"Google. Improving privacy and security on the web. https:\/\/blog.chromium.org\/2019\/05\/improving-privacy-and-security-on-web.html 2019.  Google. Improving privacy and security on the web. https:\/\/blog.chromium.org\/2019\/05\/improving-privacy-and-security-on-web.html 2019.","key":"e_1_3_2_1_20_1"},{"volume-title":"Proceedings of the USENIX conference on Networked Systems Design and Implementation (NDSI)","year":"2011","author":"Guha S.","key":"e_1_3_2_1_21_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1145\/2382196.2382276"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1007\/978-3-642-15497-3_14"},{"key":"e_1_3_2_1_24_1","first-page":"19","author":"Jia Y.","year":"2015","journal-title":"IEEE Internet Computing"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1145\/2508859.2516712"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1109\/SP.2016.57"},{"key":"e_1_3_2_1_27_1","first-page":"06","author":"Lapowsky I.","year":"2018","journal-title":"Wired"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.14722\/ndss.2015.23027"},{"volume-title":"Proceedings of the Web 2.0 Workshop on Security and Privacy (W2SP)","year":"2012","author":"Mowery K.","key":"e_1_3_2_1_29_1"},{"unstructured":"Mozilla. Privacy and the :visited selector. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/CSS\/Privacy_and_the_:visited_selector 2018.  Mozilla. Privacy and the :visited selector. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/CSS\/Privacy_and_the_:visited_selector 2018.","key":"e_1_3_2_1_30_1"},{"unstructured":"Mozilla. Supporting same-site cookies in firefox 60. https:\/\/blog.mozilla.org\/security\/2018\/04\/24\/same-site-cookies-in-firefox-60\/ 2019.  Mozilla. Supporting same-site cookies in firefox 60. https:\/\/blog.mozilla.org\/security\/2018\/04\/24\/same-site-cookies-in-firefox-60\/ 2019.","key":"e_1_3_2_1_31_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.1109\/ARES.2008.111"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_33_1","DOI":"10.1109\/SP.2013.43"},{"unstructured":"phpMyAdmin. CVE-2019-12616. http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-12616 2019.  phpMyAdmin. CVE-2019-12616. http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-12616 2019.","key":"e_1_3_2_1_34_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.1007\/978-3-319-93411-2_13"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.1145\/3243734.3243796"},{"volume-title":"Proceedings of the International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE)","year":"2011","author":"Schinzel S.","key":"e_1_3_2_1_37_1"},{"unstructured":"Schwartz J. Giving the web a memory cost its users privacy. http:\/\/www.nytimes.com\/2001\/09\/04\/technology\/04COOK.html 2001.  Schwartz J. Giving the web a memory cost its users privacy. http:\/\/www.nytimes.com\/2001\/09\/04\/technology\/04COOK.html 2001.","key":"e_1_3_2_1_38_1"},{"unstructured":"Singer N. Do not track? advertisers say \"don't tread on us\". http:\/\/www.nytimes.com\/2012\/10\/14\/technology\/do-not-track-movement-is-drawing-advertisers-fire.html 2012.  Singer N. Do not track? advertisers say \"don't tread on us\". http:\/\/www.nytimes.com\/2012\/10\/14\/technology\/do-not-track-movement-is-drawing-advertisers-fire.html 2012.","key":"e_1_3_2_1_39_1"},{"volume-title":"Proceedings of the USENIX Workshop on Offensive Technologies (WOOT)","year":"2018","author":"Smith M.","key":"e_1_3_2_1_40_1"},{"unstructured":"Sutton M. A wolf in sheep's clothing the dangers of persistent web browser storage. Black Hat DC Briefings (BHDC) (2009).  Sutton M. A wolf in sheep's clothing the dangers of persistent web browser storage. Black Hat DC Briefings (BHDC) (2009).","key":"e_1_3_2_1_41_1"},{"unstructured":"Swartz A. Web.py web framework. http:\/\/webpy.org\/ 2018.  Swartz A. Web.py web framework. http:\/\/webpy.org\/ 2018.","key":"e_1_3_2_1_42_1"},{"volume-title":"Proceedings of the Network and Distributed System Symposium (NDSS)","year":"2010","author":"Toubiana V.","key":"e_1_3_2_1_43_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_44_1","DOI":"10.1145\/2810103.2813632"},{"volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (Oakland)","year":"2011","author":"Weinber Z.","key":"e_1_3_2_1_45_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_46_1","DOI":"10.1109\/SP.2010.21"},{"unstructured":"World Wide Web Consortium. User timing. https:\/\/www.w3.org\/TR\/user-timing\/ 2018.  World Wide Web Consortium. User timing. https:\/\/www.w3.org\/TR\/user-timing\/ 2018.","key":"e_1_3_2_1_47_1"}],"event":{"acronym":"ACSAC '19","name":"ACSAC '19: 2019 Annual Computer Security Applications Conference","location":"San Juan Puerto Rico USA"},"container-title":["Proceedings of the 35th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359803","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359803","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:07Z","timestamp":1750202587000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359803"}},"subtitle":["privacy analysis of server-side request processing time"],"short-title":[],"issued":{"date-parts":[[2019,12,9]]},"references-count":47,"alternative-id":["10.1145\/3359789.3359803","10.1145\/3359789"],"URL":"https:\/\/doi.org\/10.1145\/3359789.3359803","relation":{},"subject":[],"published":{"date-parts":[[2019,12,9]]},"assertion":[{"value":"2019-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}