{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T05:36:46Z","timestamp":1757309806284,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,18]],"date-time":"2020-07-18T00:00:00Z","timestamp":1595030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,18]]},"DOI":"10.1145\/3395363.3397365","type":"proceedings-article","created":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T21:44:18Z","timestamp":1594676658000},"page":"260-271","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Feedback-driven side-channel analysis for networked applications"],"prefix":"10.1145","author":[{"given":"\u0130smet Burak","family":"Kadron","sequence":"first","affiliation":[{"name":"University of California at Santa Barbara, USA"}]},{"given":"Nicol\u00e1s","family":"Rosner","sequence":"additional","affiliation":[{"name":"University of California at Santa Barbara, USA"}]},{"given":"Tevfik","family":"Bultan","sequence":"additional","affiliation":[{"name":"University of California at Santa Barbara, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,7,18]]},"reference":[{"unstructured":"[n.d.]. Docker API for Python.  [n.d.]. Docker API for Python.","key":"e_1_3_2_1_1_1"},{"unstructured":"[n.d.]. Numpy: scientific computing with Python.  [n.d.]. Numpy: scientific computing with Python.","key":"e_1_3_2_1_2_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1145\/1314466.1314469"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/3062341.3062378"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1109\/EuroSP.2018.00029"},{"unstructured":"Philippe Biondi. [n.d.]. Scapy: Packet crafting for Python.  Philippe Biondi. [n.d.]. Scapy: Packet crafting for Python.","key":"e_1_3_2_1_6_1"},{"doi-asserted-by":"crossref","unstructured":"Adrian W Bowman. 1984. An alternative method of cross-validation for the smoothing of density estimates. Biometrika 71 2 ( 1984 ) 353-360.  Adrian W Bowman. 1984. An alternative method of cross-validation for the smoothing of density estimates. Biometrika 71 2 ( 1984 ) 353-360.","key":"e_1_3_2_1_7_1","DOI":"10.1093\/biomet\/71.2.353"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/3213846.3213867"},{"doi-asserted-by":"crossref","unstructured":"Prabir Burman. 1989. A comparative study of ordinary cross-validation v-fold cross-validation and the repeated learning-testing methods. Biometrika 76 3 ( 1989 ) 503-514.  Prabir Burman. 1989. A comparative study of ordinary cross-validation v-fold cross-validation and the repeated learning-testing methods. Biometrika 76 3 ( 1989 ) 503-514.","key":"e_1_3_2_1_9_1","DOI":"10.1093\/biomet\/76.3.503"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/2046707.2046737"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/3133956.3134058"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1109\/ASE.2017.8115636"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1109\/SP.2010.20"},{"volume-title":"F-BLEAU: Fast Black-box Leakage Estimation. CoRR abs\/","year":"1902","author":"Cherubin Giovanni","key":"e_1_3_2_1_14_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1007\/978-3-642-39799-8_47"},{"unstructured":"DARPA. 2015. The Space-Time Analysis for Cybersecurity (STAC) program. http:\/\/www.darpa.mil\/program\/space-time-analysis-for-cybersecurity  DARPA. 2015. The Space-Time Analysis for Cybersecurity (STAC) program. http:\/\/www.darpa.mil\/program\/space-time-analysis-for-cybersecurity","key":"e_1_3_2_1_16_1"},{"unstructured":"DARPA. 2017. Public release items for the DARPA Space-Time Analysis for Cybersecurity (STAC) program. https:\/\/github.com\/Apogee-Research\/STAC  DARPA. 2017. Public release items for the DARPA Space-Time Analysis for Cybersecurity (STAC) program. https:\/\/github.com\/Apogee-Research\/STAC","key":"e_1_3_2_1_17_1"},{"unstructured":"Inc. Docker. [n.d.]. Docker. https:\/\/www.docker.com\/  Inc. Docker. [n.d.]. Docker. https:\/\/www.docker.com\/","key":"e_1_3_2_1_18_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1111\/j.1469-1809.1936.tb02137.x"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1007\/3-540-44709-1_21"},{"doi-asserted-by":"crossref","unstructured":"Peter Hall JS Marron and Byeong U Park. 1992. Smoothed cross-validation. Probability theory and related fields 92 1 ( 1992 ) 1-20.  Peter Hall JS Marron and Byeong U Park. 1992. Smoothed cross-validation. Probability theory and related fields 92 1 ( 1992 ) 1-20.","key":"e_1_3_2_1_21_1","DOI":"10.1007\/BF01205233"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1145\/2517840.2517869"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1109\/MCSE.2007.55"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1145\/1455770.1455806"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1007\/BFb0055858"},{"volume-title":"Spectre Attacks: Exploiting Speculative Execution. CoRR abs\/","year":"2018","author":"Kocher Paul","key":"e_1_3_2_1_26_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1007\/3-540-68697-5_9"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1007\/3-540-48405-1_25"},{"unstructured":"lcamtuf. [n.d.]. American Fuzzy Lop. http:\/\/lcamtuf.coredump.cx\/afl\/  lcamtuf. [n.d.]. American Fuzzy Lop. http:\/\/lcamtuf.coredump.cx\/afl\/","key":"e_1_3_2_1_29_1"},{"volume-title":"27th USENIX Security Symposium, USENIX Security 2018","year":"2018","author":"Lipp Moritz","key":"e_1_3_2_1_30_1"},{"unstructured":"Thomas S Messerges Ezzy A Dabbish and Robert H Sloan. 1999. Investigations of Power Analysis Attacks on Smartcards. Smartcard 99 ( 1999 ) 151-161.  Thomas S Messerges Ezzy A Dabbish and Robert H Sloan. 1999. Investigations of Power Analysis Attacks on Smartcards. Smartcard 99 ( 1999 ) 151-161.","key":"e_1_3_2_1_31_1"},{"volume-title":"Pasareanu","year":"2018","author":"Nilizadeh Shirin","key":"e_1_3_2_1_32_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_33_1","DOI":"10.1145\/3213846.3213868"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1214\/aoms\/1177704472"},{"unstructured":"PeachTech. [n.d.]. PeachFuzzer. http:\/\/www.peach.tech\/  PeachTech. [n.d.]. PeachFuzzer. http:\/\/www.peach.tech\/","key":"e_1_3_2_1_35_1"},{"volume-title":"Scikit-learn: Machine Learning in Python. Journal of Machine Learning Research 12 ( 2011 ), 2825-2830.","year":"2011","author":"Pedregosa F.","key":"e_1_3_2_1_36_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_37_1","DOI":"10.1109\/CSF.2017.8"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_38_1","DOI":"10.1145\/2632362.2632367"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_39_1","DOI":"10.1145\/2382756.2382791"},{"volume-title":"Profit: Detecting and Quantifying Side Channels in Networked Applications. In 26th Network and Distributed System Security Symposium, NDSS 2019","year":"2019","author":"Rosner Nicol\u00e1s","key":"e_1_3_2_1_40_1"},{"unstructured":"Mats Rudemo. 1982. Empirical choice of histograms and kernel density estimators. Scandinavian Journal of Statistics ( 1982 ) 65-78.  Mats Rudemo. 1982. Empirical choice of histograms and kernel density estimators. Scandinavian Journal of Statistics ( 1982 ) 65-78.","key":"e_1_3_2_1_41_1"},{"unstructured":"K Serebryany. 2015. libFuzzer a library for coverage-guided fuzz testing. LLVM project ( 2015 ).  K Serebryany. 2015. libFuzzer a library for coverage-guided fuzz testing. LLVM project ( 2015 ).","key":"e_1_3_2_1_42_1"},{"doi-asserted-by":"crossref","unstructured":"Claude E Shannon. 1948. A mathematical theory of communication. Bell system technical journal 27 3 ( 1948 ) 379-423.  Claude E Shannon. 1948. A mathematical theory of communication. Bell system technical journal 27 3 ( 1948 ) 379-423.","key":"e_1_3_2_1_43_1","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_44_1","DOI":"10.1007\/978-1-4899-3324-9"},{"volume-title":"Timing Analysis of Keystrokes and Timing Attacks on SSH. In 10th USENIX Security Symposium","year":"2001","author":"Song Dawn Xiaodong","key":"e_1_3_2_1_45_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_46_1","DOI":"10.14722\/ndss.2016.23368"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_47_1","DOI":"10.1109\/TIFS.2017.2737970"},{"key":"e_1_3_2_1_48_1","first-page":"22","volume-title":"USENIX Security Symposium","volume":"1","author":"Yarom Yuval","year":"2014"},{"volume-title":"Generating Software Tests","year":"2019","author":"Zeller Andreas","key":"e_1_3_2_1_49_1"},{"unstructured":"Walter Zucchini A Berzel and O Nenadic. 2003. Applied smoothing techniques. Part I: Kernel Density Estimation 15 ( 2003 ).  Walter Zucchini A Berzel and O Nenadic. 2003. Applied smoothing techniques. Part I: Kernel Density Estimation 15 ( 2003 ).","key":"e_1_3_2_1_50_1"}],"event":{"sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"acronym":"ISSTA '20","name":"ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Virtual Event USA"},"container-title":["Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3395363.3397365","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3395363.3397365","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:35Z","timestamp":1750199915000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3395363.3397365"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,18]]},"references-count":50,"alternative-id":["10.1145\/3395363.3397365","10.1145\/3395363"],"URL":"https:\/\/doi.org\/10.1145\/3395363.3397365","relation":{},"subject":[],"published":{"date-parts":[[2020,7,18]]},"assertion":[{"value":"2020-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}