{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T15:14:20Z","timestamp":1772032460092,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001665","name":"Agence Nationale de la Recherche","doi-asserted-by":"publisher","award":["ANR-19-CE39-0007"],"award-info":[{"award-number":["ANR-19-CE39-0007"]}],"id":[{"id":"10.13039\/501100001665","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,30]]},"DOI":"10.1145\/3488932.3517411","type":"proceedings-article","created":{"date-parts":[[2022,5,24]],"date-time":"2022-05-24T04:23:26Z","timestamp":1653366206000},"page":"1182-1194","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Port Contention Goes Portable"],"prefix":"10.1145","author":[{"given":"Thomas","family":"Rokicki","sequence":"first","affiliation":[{"name":"Univ Rennes, CNRS, IRISA, Rennes, France"}]},{"given":"Cl\u00e9mentine","family":"Maurice","sequence":"additional","affiliation":[{"name":"Univ Lille, CNRS, Inria, Lille, France"}]},{"given":"Marina","family":"Botvinnik","sequence":"additional","affiliation":[{"name":"Ben-Gurion University of the Negev, Be'er Sheva, Israel"}]},{"given":"Yossi","family":"Oren","sequence":"additional","affiliation":[{"name":"Ben-Gurion University of the Negev, Be'er Sheva, Israel"}]}],"member":"320","published-online":{"date-parts":[[2022,5,30]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Andreas Abel and Jan Reineke. Tzcnt uops.info page. https:\/\/uops.info\/html-instr\/TZCNT_R16_R16.html. Accessed: 2021--11--11.  Andreas Abel and Jan Reineke. Tzcnt uops.info page. https:\/\/uops.info\/html-instr\/TZCNT_R16_R16.html. Accessed: 2021--11--11."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304062"},{"key":"e_1_3_2_2_3_1","volume-title":"Sohaib ul Hassan, Cesar Pereida Garc\u00eda, and Nicola Tuveri. Port contention for fun and profit. In S&P","author":"Aldaya Alejandro Cabrera","year":"2019","unstructured":"Alejandro Cabrera Aldaya , Billy Bob Brumley , Sohaib ul Hassan, Cesar Pereida Garc\u00eda, and Nicola Tuveri. Port contention for fun and profit. In S&P , 2019 . Alejandro Cabrera Aldaya, Billy Bob Brumley, Sohaib ul Hassan, Cesar Pereida Garc\u00eda, and Nicola Tuveri. Port contention for fun and profit. In S&P, 2019."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(61)80037-5"},{"key":"e_1_3_2_2_5_1","volume-title":"CCS","author":"Bhattacharyya Atri","year":"2019","unstructured":"Atri Bhattacharyya , Alexandra Sandulescu , Matthias Neugschwandtner , Alessandro Sorniotti , Babak Falsafi , Mathias Payer , and Anil Kurmus . Smotherspectre : Exploiting speculative execution through port contention . In CCS , 2019 . Atri Bhattacharyya, Alexandra Sandulescu, Matthias Neugschwandtner, Alessandro Sorniotti, Babak Falsafi, Mathias Payer, and Anil Kurmus. Smotherspectre: Exploiting speculative execution through port contention. In CCS, 2019."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972764.29"},{"key":"e_1_3_2_2_7_1","unstructured":"MDN contributors. Cross-origin-embedder-policy. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/HTTP\/Headers\/Cross-Origin-Embedder-Policy. Accessed: 2021-19-11.  MDN contributors. Cross-origin-embedder-policy. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/HTTP\/Headers\/Cross-Origin-Embedder-Policy. Accessed: 2021-19-11."},{"key":"e_1_3_2_2_8_1","unstructured":"MDN contributors. Cross-origin-opener-policy. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/HTTP\/Headers\/Cross-Origin-Opener-Policy. Accessed: 2021-19-11.  MDN contributors. Cross-origin-opener-policy. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/HTTP\/Headers\/Cross-Origin-Opener-Policy. Accessed: 2021-19-11."},{"key":"e_1_3_2_2_9_1","volume-title":"USENIX Security Symposium","author":"Dessouky Ghada","year":"2020","unstructured":"Ghada Dessouky , Tommaso Frassetto , and Ahmad-Reza Sadeghi . Hybcache : Hybrid side-channel-resilient caches for trusted execution environments . In USENIX Security Symposium , 2020 . Ghada Dessouky, Tommaso Frassetto, and Ahmad-Reza Sadeghi. Hybcache: Hybrid side-channel-resilient caches for trusted execution environments. In USENIX Security Symposium, 2020."},{"key":"e_1_3_2_2_10_1","unstructured":"ECMA. Standard ecma-262. https:\/\/www.ecma-international.org\/publications\/standards\/Ecma-262.htm. Accessed: 2021-10-11.  ECMA. Standard ecma-262. https:\/\/www.ecma-international.org\/publications\/standards\/Ecma-262.htm. Accessed: 2021-10-11."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93387-0_5"},{"key":"e_1_3_2_2_12_1","unstructured":"Google. Product status: Microarchitectural data sampling (mds). https:\/\/support.google.com\/faqs\/answer\/9330250?hl=en. Accessed: 2021-19-11.  Google. Product status: Microarchitectural data sampling (mds). https:\/\/support.google.com\/faqs\/answer\/9330250?hl=en. Accessed: 2021-19-11."},{"key":"e_1_3_2_2_13_1","unstructured":"Google. V8 javascript engine. https:\/\/v8.dev\/. Accessed: 2021-10-11.  Google. V8 javascript engine. https:\/\/v8.dev\/. Accessed: 2021-10-11."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.23018"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23271"},{"key":"e_1_3_2_2_16_1","volume-title":"DIMVA","author":"Gruss Daniel","year":"2016","unstructured":"Daniel Gruss , Cl\u00e9mentine Maurice , and Stefan Mangard . Rowhammer. js : A remote software-induced fault attack in javascript . In DIMVA , 2016 . Daniel Gruss, Cl\u00e9mentine Maurice, and Stefan Mangard. Rowhammer. js: A remote software-induced fault attack in javascript. In DIMVA, 2016."},{"key":"e_1_3_2_2_17_1","volume-title":"Error detecting and error correcting codes. The Bell system technical journal, 29(2):147--160","author":"Hamming Richard W","year":"1950","unstructured":"Richard W Hamming . Error detecting and error correcting codes. The Bell system technical journal, 29(2):147--160 , 1950 . Richard W Hamming. Error detecting and error correcting codes. The Bell system technical journal, 29(2):147--160, 1950."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2009.4798277"},{"key":"e_1_3_2_2_20_1","unstructured":"Michael Larabel. Openbsd disabling smt \/ hyper threading due to security concerns. https:\/\/www.phoronix.com\/scan.php?page=news_item&px=OpenBSD-Disabling-SMT. Accessed: 2021-19-11.  Michael Larabel. Openbsd disabling smt \/ hyper threading due to security concerns. https:\/\/www.phoronix.com\/scan.php?page=news_item&px=OpenBSD-Disabling-SMT. Accessed: 2021-19-11."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_11"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2014.28"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23294"},{"key":"e_1_3_2_2_25_1","unstructured":"MDN. Navigator.hardwareconcurrency. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/API\/Navigator\/hardwareConcurrency. Accessed: 2021-19-11.  MDN. Navigator.hardwareconcurrency. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/API\/Navigator\/hardwareConcurrency. Accessed: 2021-19-11."},{"key":"e_1_3_2_2_26_1","unstructured":"Mozilla. Spidermonkey javascript engine. https:\/\/spidermofnkey.dev\/. Accessed: 2021-10-11.  Mozilla. Spidermonkey javascript engine. https:\/\/spidermofnkey.dev\/. Accessed: 2021-10-11."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813708"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00011"},{"key":"e_1_3_2_2_29_1","volume-title":"USENIX Security Symposium","author":"Reis Charles","year":"2019","unstructured":"Charles Reis , Alexander Moshchuk , and Nasko Oskov . Site isolation : Process separation for web sites within the browser . In USENIX Security Symposium , 2019 . Charles Reis, Alexander Moshchuk, and Nasko Oskov. Site isolation: Process separation for web sites within the browser. In USENIX Security Symposium, 2019."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP51992.2021.00039"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46598-2_14"},{"key":"e_1_3_2_2_32_1","volume-title":"USENIX Security Symposium","author":"Saileshwar Gururaj","year":"2021","unstructured":"Gururaj Saileshwar and Moinuddin K. Qureshi . MIRAGE: mitigating conflict-based cache attacks with a practical fully-associative design . In USENIX Security Symposium , 2021 . Gururaj Saileshwar and Moinuddin K. Qureshi. MIRAGE: mitigating conflict-based cache attacks with a practical fully-associative design. In USENIX Security Symposium, 2021."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70972-7_13"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58201-2_1"},{"key":"e_1_3_2_2_35_1","volume-title":"USENIX Security Symposium","author":"Shusterman Anatoly","year":"2021","unstructured":"Anatoly Shusterman , Ayush Agarwal , Sioli O'Connell , Daniel Genkin , Yossi Oren , and Yuval Yarom . Prime probe 1, javascript 0: Overcoming browser-based side-channel defenses . In USENIX Security Symposium , 2021 . Anatoly Shusterman, Ayush Agarwal, Sioli O'Connell, Daniel Genkin, Yossi Oren, and Yuval Yarom. Prime probe 1, javascript 0: Overcoming browser-based side-channel defenses. In USENIX Security Symposium, 2021."},{"key":"e_1_3_2_2_36_1","volume-title":"USENIX Security Symposium","author":"Taram Mohammadkazem","year":"2022","unstructured":"Mohammadkazem Taram , Xida Ren , Ashish Venkat , and Dean Tullsen . Secsmt : Securing SMT processors against contention-based covert channels . In USENIX Security Symposium , 2022 . Mohammadkazem Taram, Xida Ren, Ashish Venkat, and Dean Tullsen. Secsmt: Securing SMT processors against contention-based covert channels. In USENIX Security Symposium, 2022."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.2019.00012"},{"key":"e_1_3_2_2_38_1","volume-title":"11th USENIX Workshop on Offensive Technologies (WOOT)","author":"van Goethem Tom","year":"2017","unstructured":"Tom van Goethem and Wouter Joosen . One side-channel to bring them all and in the darkness bind them: Associating isolated browsing sessions . In 11th USENIX Workshop on Offensive Technologies (WOOT) , 2017 . Tom van Goethem and Wouter Joosen. One side-channel to bring them all and in the darkness bind them: Associating isolated browsing sessions. In 11th USENIX Workshop on Offensive Technologies (WOOT), 2017."},{"key":"e_1_3_2_2_39_1","volume-title":"Pietro Frigo, Giorgi Maisuradze, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. RIDL: rogue in-flight data load. In S&P","author":"van Schaik Stephan","year":"2019","unstructured":"Stephan van Schaik , Alyssa Milburn , Sebastian \u00d6 sterlund , Pietro Frigo, Giorgi Maisuradze, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. RIDL: rogue in-flight data load. In S&P , 2019 . Stephan van Schaik, Alyssa Milburn, Sebastian \u00d6 sterlund, Pietro Frigo, Giorgi Maisuradze, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. RIDL: rogue in-flight data load. In S&P, 2019."},{"key":"e_1_3_2_2_40_1","volume-title":"USENIX Security Symposium","author":"Vila Pepe","year":"2017","unstructured":"Pepe Vila and Boris K\u00f6 pf. Loophole : Timing attacks on shared event loops in chrome . In USENIX Security Symposium , 2017 . Pepe Vila and Boris K\u00f6 pf. Loophole: Timing attacks on shared event loops in chrome. In USENIX Security Symposium, 2017."},{"key":"e_1_3_2_2_41_1","unstructured":"W3C. Index of standardized webassembly instructions. https:\/\/webassembly.github.io\/spec\/core\/appendix\/index-instructions.html. Accessed: 2021-19-11.  W3C. Index of standardized webassembly instructions. https:\/\/webassembly.github.io\/spec\/core\/appendix\/index-instructions.html. Accessed: 2021-19-11."},{"key":"e_1_3_2_2_42_1","unstructured":"W3C. Webassembly. https:\/\/webassembly.org\/. Accessed: 2021-10-11.  W3C. Webassembly. https:\/\/webassembly.org\/. Accessed: 2021-10-11."},{"key":"e_1_3_2_2_43_1","volume-title":"USENIX Security Symposium","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Katrina Falkner . FLUSH+RELOAD : A high resolution, low noise, L3 cache side-channel attack . In USENIX Security Symposium , 2014 . Yuval Yarom and Katrina Falkner. FLUSH+RELOAD: A high resolution, low noise, L3 cache side-channel attack. In USENIX Security Symposium, 2014."},{"key":"e_1_3_2_2_44_1","volume-title":"CCS","author":"Zhang Yinqian","year":"2013","unstructured":"Yinqian Zhang and Michael K. Reiter . D\u00fcppel: retrofitting commodity operating systems to mitigate cache side channels in the cloud . In CCS , 2013 . Yinqian Zhang and Michael K. Reiter. D\u00fcppel: retrofitting commodity operating systems to mitigate cache side channels in the cloud. In CCS, 2013."}],"event":{"name":"ASIA CCS '22: ACM Asia Conference on Computer and Communications Security","location":"Nagasaki Japan","acronym":"ASIA CCS '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488932.3517411","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3488932.3517411","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:29Z","timestamp":1750193309000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488932.3517411"}},"subtitle":["Port Contention Side Channels in Web Browsers"],"short-title":[],"issued":{"date-parts":[[2022,5,30]]},"references-count":44,"alternative-id":["10.1145\/3488932.3517411","10.1145\/3488932"],"URL":"https:\/\/doi.org\/10.1145\/3488932.3517411","relation":{},"subject":[],"published":{"date-parts":[[2022,5,30]]},"assertion":[{"value":"2022-05-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}