{"id":"https://openalex.org/W1965209910","doi":"https://doi.org/10.1145/2810103.2813632","title":"The Clock is Still Ticking","display_name":"The Clock is Still Ticking","publication_year":2015,"publication_date":"2015-10-06","ids":{"openalex":"https://openalex.org/W1965209910","doi":"https://doi.org/10.1145/2810103.2813632","mag":"1965209910"},"language":"en","primary_location":{"id":"doi:10.1145/2810103.2813632","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2810103.2813632","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://lirias.kuleuven.be/handle/123456789/541727","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061602585","display_name":"Tom Van Goethem","orcid":"https://orcid.org/0000-0001-6846-9081"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":true,"raw_author_name":"Tom Van Goethem","raw_affiliation_strings":["KU Leuven, Leuven, Belgium","KU Leuven, Leuven (Belgium)"],"affiliations":[{"raw_affiliation_string":"KU Leuven, Leuven, Belgium","institution_ids":["https://openalex.org/I99464096"]},{"raw_affiliation_string":"KU Leuven, Leuven (Belgium)","institution_ids":["https://openalex.org/I99464096"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054031138","display_name":"Wouter Joosen","orcid":"https://orcid.org/0000-0002-7710-5092"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Wouter Joosen","raw_affiliation_strings":["KU Leuven, Leuven, Belgium","KU Leuven, Leuven (Belgium)"],"affiliations":[{"raw_affiliation_string":"KU Leuven, Leuven, Belgium","institution_ids":["https://openalex.org/I99464096"]},{"raw_affiliation_string":"KU Leuven, Leuven (Belgium)","institution_ids":["https://openalex.org/I99464096"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014031812","display_name":"Nick Nikiforakis","orcid":"https://orcid.org/0000-0002-9366-357X"},"institutions":[{"id":"https://openalex.org/I59553526","display_name":"Stony Brook University","ror":"https://ror.org/05qghxh33","country_code":"US","type":"education","lineage":["https://openalex.org/I59553526"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nick Nikiforakis","raw_affiliation_strings":["Stony Brook University, Stony Brook, NY, USA"],"affiliations":[{"raw_affiliation_string":"Stony Brook University, Stony Brook, NY, USA","institution_ids":["https://openalex.org/I59553526"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5061602585"],"corresponding_institution_ids":["https://openalex.org/I99464096"],"apc_list":null,"apc_paid":null,"fwci":8.0124,"has_fulltext":false,"cited_by_count":75,"citation_normalized_percentile":{"value":0.97347458,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1382","last_page":"1393"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8103122711181641},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7477190494537354},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.5980391502380371},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.5255357623100281},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.5239003896713257},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.522715151309967},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.490759938955307},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.4747196435928345},{"id":"https://openalex.org/keywords/timing-attack","display_name":"Timing attack","score":0.4660077691078186},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.43663424253463745},{"id":"https://openalex.org/keywords/state-information","display_name":"State information","score":0.4282761216163635},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4137873351573944},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3911688029766083},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.231469988822937},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.17287135124206543},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11195674538612366}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8103122711181641},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7477190494537354},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.5980391502380371},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.5255357623100281},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.5239003896713257},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.522715151309967},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.490759938955307},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.4747196435928345},{"id":"https://openalex.org/C28420585","wikidata":"https://www.wikidata.org/wiki/Q2665075","display_name":"Timing attack","level":4,"score":0.4660077691078186},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.43663424253463745},{"id":"https://openalex.org/C2985963534","wikidata":"https://www.wikidata.org/wiki/Q7603704","display_name":"State information","level":3,"score":0.4282761216163635},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4137873351573944},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3911688029766083},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.231469988822937},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.17287135124206543},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11195674538612366},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/2810103.2813632","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2810103.2813632","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:lirias2repo.kuleuven.be:123456789/541727","is_oa":true,"landing_page_url":"https://lirias.kuleuven.be/handle/123456789/541727","pdf_url":null,"source":{"id":"https://openalex.org/S4306401954","display_name":"Lirias (KU Leuven)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I99464096","host_organization_name":"KU Leuven","host_organization_lineage":["https://openalex.org/I99464096"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"ACM SIGSAC Conference on Computer and Communications Security 2015 (CCS 2015), Denver, Colorado, USA, 12-16 October 2015","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"pmh:oai:lirias2repo.kuleuven.be:123456789/541727","is_oa":true,"landing_page_url":"https://lirias.kuleuven.be/handle/123456789/541727","pdf_url":null,"source":{"id":"https://openalex.org/S4306401954","display_name":"Lirias (KU Leuven)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I99464096","host_organization_name":"KU Leuven","host_organization_lineage":["https://openalex.org/I99464096"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"ACM SIGSAC Conference on Computer and Communications Security 2015 (CCS 2015), Denver, Colorado, USA, 12-16 October 2015","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2579040122","display_name":null,"funder_award_id":"EU FP7","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G3484484226","display_name":"TWC: Small: Cross-Application and Cross-Platform Tracking of Web Users: Techniques and Countermeasures","funder_award_id":"1527086","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G3535893714","display_name":null,"funder_award_id":"CNS-1527086","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4031804876","display_name":null,"funder_award_id":"SPION","funder_id":"https://openalex.org/F4320321732","funder_display_name":"Agentschap voor Innovatie door Wetenschap en Technologie"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320321732","display_name":"Agentschap voor Innovatie door Wetenschap en Technologie","ror":"https://ror.org/01antkr91"},{"id":"https://openalex.org/F4320322308","display_name":"KU Leuven","ror":"https://ror.org/05f950310"},{"id":"https://openalex.org/F4320331904","display_name":"Stony Brook University","ror":"https://ror.org/05qghxh33"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W7391737","https://openalex.org/W1613874182","https://openalex.org/W1779735989","https://openalex.org/W1972524097","https://openalex.org/W1980800818","https://openalex.org/W1988160443","https://openalex.org/W1997546092","https://openalex.org/W1998180710","https://openalex.org/W1999683085","https://openalex.org/W2040210405","https://openalex.org/W2045726900","https://openalex.org/W2072978486","https://openalex.org/W2094120888","https://openalex.org/W2094258292","https://openalex.org/W2103262407","https://openalex.org/W2107691219","https://openalex.org/W2108384401","https://openalex.org/W2143445293","https://openalex.org/W2169699274","https://openalex.org/W2188560665","https://openalex.org/W4285719527","https://openalex.org/W6906355099"],"related_works":["https://openalex.org/W1971956962","https://openalex.org/W2188560665","https://openalex.org/W4297042454","https://openalex.org/W3028997697","https://openalex.org/W3008088605","https://openalex.org/W3192308411","https://openalex.org/W2887442533","https://openalex.org/W2034199088","https://openalex.org/W4387031668","https://openalex.org/W3171718976"],"abstract_inverted_index":{"Web-based":[0],"timing":[1,79,99,114],"attacks":[2,115,144,152,168],"have":[3,45],"been":[4,13],"known":[5],"for":[6],"over":[7,57],"a":[8,34,37,58,133,137],"decade,":[9],"and":[10,50,119,145,158,180],"it":[11],"has":[12],"shown":[14],"that,":[15],"under":[16],"optimal":[17,70],"network":[18,103],"conditions,":[19],"an":[20,25,122],"adversary":[21],"can":[22,93,124],"use":[23,125],"such":[24],"attack":[26],"to":[27,48,75,96,127],"obtain":[28,128],"information":[29,130],"on":[30,132,136,175],"the":[31,69,164],"state":[32,135],"of":[33,102,155,166],"user":[35],"in":[36,153],"cross-origin":[38,138],"website.":[39,139],"In":[40,81],"recent":[41],"years,":[42],"desktop":[43],"computers":[44],"given":[46],"way":[47],"laptops":[49],"mobile":[51,61],"devices,":[52],"which":[53],"are":[54,73],"mostly":[55],"connected":[56],"wireless":[59],"or":[60],"network.":[62],"These":[63],"connections":[64],"often":[65],"do":[66],"not":[67],"meet":[68],"conditions":[71],"that":[72,86,92,147,163],"required":[74],"reliably":[76],"perform":[77],"cross-site":[78],"attacks.":[80],"this":[82],"paper,":[83],"we":[84,109,161],"show":[85,162],"modern":[87,117],"browsers":[88,118],"expose":[89],"new":[90],"side-channels":[91],"be":[94],"used":[95],"acquire":[97],"accurate":[98],"measurements,":[100],"regardless":[101],"conditions.":[104],"Using":[105],"several":[106],"real-world":[107],"examples,":[108],"introduce":[110],"four":[111],"novel":[112],"web-based":[113],"against":[116],"describe":[120],"how":[121],"attacker":[123],"them":[126],"personal":[129],"based":[131,174],"user's":[134],"We":[140],"evaluate":[141],"our":[142,167],"proposed":[143],"demonstrate":[146],"they":[148],"significantly":[149],"outperform":[150],"current":[151],"terms":[154],"speed,":[156],"reliability,":[157],"accuracy.":[159],"Furthermore,":[160],"nature":[165],"renders":[169],"traditional":[170],"defenses,":[171],"i.e.,":[172],"those":[173],"randomly":[176],"delaying":[177],"responses,":[178],"moot":[179],"discuss":[181],"possible":[182],"server-side":[183],"defense":[184],"mechanisms.":[185]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":10},{"year":2020,"cited_by_count":11},{"year":2019,"cited_by_count":17},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":8},{"year":2016,"cited_by_count":5}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
