{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T06:04:44Z","timestamp":1769925884615,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T00:00:00Z","timestamp":1604016000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"funder":[{"DOI":"10.13039\/100011199","name":"European Research Council","doi-asserted-by":"publisher","award":["804476"],"award-info":[{"award-number":["804476"]}],"id":[{"id":"10.13039\/100011199","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,30]]},"DOI":"10.1145\/3372297.3421761","type":"proceedings-article","created":{"date-parts":[[2020,11,2]],"date-time":"2020-11-02T18:27:02Z","timestamp":1604341622000},"page":"1887-1902","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["D\u00e9j\u00e0 Vu: Side-Channel Analysis of Mozilla's NSS"],"prefix":"10.1145","author":[{"given":"Sohaib ul","family":"Hassan","sequence":"first","affiliation":[{"name":"Tampere University, Tampere, Finland"}]},{"given":"Iaroslav","family":"Gridin","sequence":"additional","affiliation":[{"name":"Tampere University, Tampere, Finland"}]},{"given":"Ignacio M.","family":"Delgado-Lozano","sequence":"additional","affiliation":[{"name":"Tampere University, Tampere, Finland"}]},{"given":"Cesar Pereida","family":"Garc\u00eda","sequence":"additional","affiliation":[{"name":"Tampere University, Tampere, Finland"}]},{"given":"Jes\u00fas-Javier","family":"Chi-Dom\u00ednguez","sequence":"additional","affiliation":[{"name":"Tampere University, Tampere, Finland"}]},{"given":"Alejandro Cabrera","family":"Aldaya","sequence":"additional","affiliation":[{"name":"Tampere University, Tampere, Finland"}]},{"given":"Billy Bob","family":"Brumley","sequence":"additional","affiliation":[{"name":"Tampere University, Tampere, Finland"}]}],"member":"320","published-online":{"date-parts":[[2020,11,2]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"11th IMA International Conference, Cirencester, UK, December 18--20, 2007, Proceedings (Lecture Notes in Computer Science","volume":"203","author":"Aciiccmez Onur","year":"2007"},{"key":"e_1_3_2_2_2_1","volume-title":"Port Contention for Fun and Profit. In 2019 IEEE Symposium on Security and Privacy, SP 2019","author":"Aldaya Alejandro Cabrera","year":"2019"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-016-0135-4"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1002\/cta.2283"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i4.213-242"},{"key":"e_1_3_2_2_6_1","volume-title":"Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016","author":"Allan Thomas","year":"2016"},{"key":"e_1_3_2_2_7_1","volume-title":"Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, AsiaCCS 2015","author":"Apecechea Gorka Irazoqui","year":"2015"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29485-8_14"},{"key":"e_1_3_2_2_9_1","volume-title":"Jes\u00fas-Javier Chi-Dom\u00ednguez, Luis Rivera-Zamarripa, and Igor Ustinov.","author":"Belyavsky Dmitry","year":"2020"},{"key":"e_1_3_2_2_10_1","volume-title":"CHES 2014 - 16th International Workshop, Busan, South Korea, September 23--26, 2014. Proceedings (Lecture Notes in Computer Science","volume":"92","author":"Benger Naomi"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i3.340-398"},{"key":"e_1_3_2_2_12_1","volume-title":"15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6--10, 2009. Proceedings (Lecture Notes in Computer Science","volume":"684","author":"Brumley Billy Bob"},{"key":"e_1_3_2_2_13_1","volume-title":"Proceedings (Lecture Notes in Computer Science","volume":"371","author":"Brumley Billy Bob","year":"2011"},{"key":"e_1_3_2_2_14_1","volume-title":"Coar and David Robinson","author":"Ken","year":"2004"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68339-9_14"},{"key":"e_1_3_2_2_16_1","volume-title":"IACR Cryptology ePrint Archive","author":"Costan Victor","year":"2016"},{"key":"e_1_3_2_2_17_1","unstructured":"The FPLLL development team. 2016. fplll a lattice reduction library. (2016). https:\/\/github.com\/fplll\/fplll  The FPLLL development team. 2016. fplll a lattice reduction library. (2016). https:\/\/github.com\/fplll\/fplll"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2756550"},{"key":"e_1_3_2_2_19_1","volume-title":"Without Compromises. In 2019 IEEE Symposium on Security and Privacy, SP 2019","author":"Erbsen Andres","year":"2019"},{"key":"e_1_3_2_2_20_1","volume-title":"29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco \/ French Riviera, May 30 - June 3, 2010. Proceedings (Lecture Notes in Computer Science","volume":"278","author":"Gama Nicolas","year":"2010"},{"key":"e_1_3_2_2_21_1","volume-title":"Proceedings of the 29th USENIX Security Symposium","author":"Cesar Pereida","year":"2020"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978353"},{"key":"e_1_3_2_2_23_1","volume-title":"DIMVA 2019, Gothenburg, Sweden, June 19--20, 2019, Proceedings (Lecture Notes in Computer Science","volume":"350","author":"Gridin Iaroslav","year":"2019"},{"key":"e_1_3_2_2_24_1","volume-title":"Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches. In 24th USENIX Security Symposium, USENIX Security 15","author":"Gruss Daniel","year":"2015"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1013367.1013496"},{"key":"e_1_3_2_2_26_1","volume-title":"29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16--20, 2009. Proceedings (Lecture Notes in Computer Science","volume":"17","author":"Heninger Nadia","year":"2009"},{"key":"e_1_3_2_2_27_1","article-title":"Minerva: The curse of ECDSA nonces","volume":"2020","author":"Jancar Jan","year":"2020","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/646764.703989"},{"key":"e_1_3_2_2_29_1","volume-title":"Mathematical Modelling for Next-Generation Cryptography. Math. Ind. (Tokyo)","author":"Kunihiro Noboru"},{"key":"e_1_3_2_2_30_1","volume-title":"Proceedings of the 29th USENIX Security Symposium","author":"Moghimi Daniel","year":"2020"},{"issue":"2","key":"e_1_3_2_2_31_1","first-page":"8017","article-title":"PKCS #1","volume":"2","author":"Moriarty Kathleen","year":"2016","journal-title":"RSA Cryptography Specifications Version"},{"key":"e_1_3_2_2_32_1","volume-title":"4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28--30, 2007, Proceedings (Lecture Notes in Computer Science","author":"Oiwa Yutaka","year":"2007"},{"key":"e_1_3_2_2_33_1","volume-title":"Proceedings. http:\/\/www.daemonology.net\/papers\/cachemissing.pdf","author":"Percival Colin","year":"2005"},{"key":"e_1_3_2_2_34_1","volume-title":"Constant-Time Callees with Variable-Time Callers. In 26th USENIX Security Symposium, USENIX Security 2017","author":"Billy Bob Brumley Cesar Pereida","year":"2017"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978420"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00062"},{"key":"e_1_3_2_2_37_1","first-page":"146","article-title":"Return of the Hidden Number Problem: A Widespread and Novel Key Extraction Attack on ECDSA and DSA","volume":"2019","author":"Ryan Keegan","year":"2019","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897885"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/0021-9991(67)90047-2"},{"key":"e_1_3_2_2_40_1","volume-title":"Graphene-SGX: A Practical Library OS for Unmodified Applications on SGX. In 2017 USENIX Annual Technical Conference, USENIX ATC 2017","author":"Porter Donald E.","year":"2017"},{"key":"e_1_3_2_2_41_1","volume-title":"SecDev","author":"Tuveri Nicola","year":"2019"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274725"},{"key":"e_1_3_2_2_43_1","volume-title":"Jes\u00fas-Javier Chi-Dom\u00ednguez, Alejandro Cabrera Aldaya, and Billy Bob Brumley.","author":"Hassan Sohaib","year":"2020"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23171"},{"key":"e_1_3_2_2_45_1","volume-title":"Proceedings of the 2nd Workshop on System Software for Trusted Execution, SysTEX@SOSP 2017","author":"Bulck Jo Van","year":"2017"},{"key":"e_1_3_2_2_46_1","volume-title":"26th USENIX Security Symposium, USENIX Security 2017","author":"Bulck Jo Van","year":"2017"},{"key":"e_1_3_2_2_47_1","volume-title":"Proceedings (Lecture Notes in Computer Science","volume":"21","author":"van de Pol Joop","year":"2015"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134038"},{"key":"e_1_3_2_2_49_1","volume-title":"Proceedings of the 29th USENIX Security Symposium","author":"Weiser Samuel","year":"2020"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196524"},{"key":"e_1_3_2_2_51_1","volume-title":"DATA - Differential Address Trace Analysis: Finding Address-based Side-Channels in Binaries. In 27th USENIX Security Symposium, USENIX Security 2018","author":"Weiser Samuel","year":"2018"},{"key":"e_1_3_2_2_52_1","volume-title":"Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems. In 2015 IEEE Symposium on Security and Privacy, SP 2015","author":"Xu Yuanzhong","year":"2015"},{"key":"e_1_3_2_2_53_1","volume-title":"Proceedings (Lecture Notes in Computer Science","volume":"367","author":"Yarom Yuval","year":"2016"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"crossref","unstructured":"Robert Zuccherato Patrick Cain Carlisle Adams and Denis Pinkas. 2001. Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP). RFC 3161. RFC Editor. 1--26 pages. https:\/\/doi.org\/10.17487\/RFC3161  Robert Zuccherato Patrick Cain Carlisle Adams and Denis Pinkas. 2001. Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP). RFC 3161. RFC Editor. 1--26 pages. https:\/\/doi.org\/10.17487\/RFC3161","DOI":"10.17487\/rfc3161"}],"event":{"name":"CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event USA","acronym":"CCS '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372297.3421761","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372297.3421761","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:32Z","timestamp":1750197692000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372297.3421761"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,30]]},"references-count":54,"alternative-id":["10.1145\/3372297.3421761","10.1145\/3372297"],"URL":"https:\/\/doi.org\/10.1145\/3372297.3421761","relation":{},"subject":[],"published":{"date-parts":[[2020,10,30]]},"assertion":[{"value":"2020-11-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}