
[38] P. Laperdrix, B. Baudry, and V. Mishra, “Fprandom: Randomizing core
browser objects to break advanced device fingerprinting techniques,” in
ESSoS, 2017.
[39] P. Laperdrix, W. Rudametkin, and B. Baudry, “Beauty and the beast:
Diverting modern web browsers to build unique browser fingerprints,”
in S&P, 2016.
[40] M. Lipp, M. T. Aga, M. Schwarz, D. Gruss, C. Maurice, L. Raab, and
L. Lamster, “Nethammer: Inducing rowhammer faults through network
requests,” arXiv:1711.08002, 2017.
[41] M. Lipp, D. Gruss, M. Schwarz, D. Bidner, C. Maurice, and S. Mangard,
“Practical Keystroke Timing Attacks in Sandboxed JavaScript,” in
ESORICS, 2017.
[42] M. Lipp, D. Gruss, R. Spreitzer, C. Maurice, and S. Mangard, “AR-
Mageddon: Cache Attacks on Mobile Devices,” in USENIX Security
Symposium, 2016.
[43] M. Lipp, M. Schwarz, D. Gruss, T. Prescher, W. Haas, A. Fogh,
J. Horn, S. Mangard, P. Kocher, D. Genkin, Y. Yarom, and M. Hamburg,
“Meltdown: Reading Kernel Memory from User Space,” in USENIX
Security Symposium, 2018.
[44] M. Mehrnezhad, E. Toreini, S. F. Shahandashti, and F. Hao, “Touchsig-
natures: identification of user touch actions and pins based on mobile
sensor data via javascript,” Journal of Information Security and Appli-
cations, 2016.
[45] A. Miagkov, “Chameleon - browser fingerprinting protection for
everybody,” 2015. [Online]. Available: https://github.com/ghostwords/
chameleon
[46] K. Mowery, D. Bogenreif, S. Yilek, and H. Shacham, “Fingerprinting
information in javascript implementations,” in W2SP, 2011.
[47] Mozilla, “mdn-browser-compat-data,” 2018. [Online]. Available: https:
//github.com/mdn/browser-compat-data
[48] ——, “Private browsing - use firefox without saving history,”
2018. [Online]. Available: https://support.mozilla.org/en-US/kb/private-
browsing-use-firefox-without-history
[49] ——, “Vendor prefix,” 2018. [Online]. Available: https://developer.
mozilla.org/en-US/docs/Glossary/Vendor Prefix
[50] N. Nikiforakis, W. Joosen, and B. Livshits, “Privaricator: Deceiving
fingerprinters with little white lies,” in WWW, 2015.
[51] N. Nikiforakis, A. Kapravelos, W. Joosen, C. Kruegel, F. Piessens, and
G. Vigna, “Cookieless monster: Exploring the ecosystem of web-based
device fingerprinting,” in Security and privacy (SP), 2013.
[52] L. Olejnik, “Stealing sensitive browser data with the
W3C Ambient Light Sensor API,” 2017. [Online]. Avail-
able: https://blog.lukaszolejnik.com/stealing-sensitive-browser-data-
with-the- w3c-ambient- light-sensor-api/
[53] L. Olejnik, S. Englehardt, and A. Narayanan, “Battery status not
included: Assessing privacy in web standards,” in Workshop on Privacy
Engineering (IWPE), 2017.
[54] Y. Oren, V. P. Kemerlis, S. Sethumadhavan, and A. D. Keromytis, “The
Spy in the Sandbox: Practical Cache Attacks in JavaScript and their
Implications,” in CCS, 2015.
[55] D. A. Osvik, A. Shamir, and E. Tromer, “Cache Attacks and Counter-
measures: the Case of AES,” in CT-RSA, 2006.
[56] C. Percival, “Cache missing for fun and profit,” in BSDCan, 2005.
[57] M. Perry, E. Clark, S. Murdoch, and G. Koppen. (2018, 05) The
design and implementation of the tor browser. [Online]. Available:
https://www.torproject.org/projects/torbrowser/design/
[58] P. Pessl, D. Gruss, C. Maurice, M. Schwarz, and S. Mangard, “DRAMA:
Exploiting DRAM Addressing for Cross-CPU Attacks,” in USENIX
Security Symposium, 2016.
[59] C. Reis, “Mitigating spectre with site isolation in chrome,”
2018. [Online]. Available: https://security.googleblog.com/2018/07/
mitigating-spectre- with-site- isolation.html
[60] D. S. Rudesill, J. Caverlee, and D. Sui, “The deep web and the darknet:
A look inside the internet’s massive black box,” 2015.
[61] B. Schneier, “Attacking tor: how the nsa targets users’ online
anonymity,” The Guardian, vol. 4, 2013.
[62] M. Schwarz, D. Gruss, S. Weiser, C. Maurice, and S. Mangard,
“Malware Guard Extension: Using SGX to Conceal Cache Attacks ,”
in DIMVA, 2017.
[63] M. Schwarz, M. Lipp, and D. Gruss, “JavaScript Zero: Real JavaScript
and Zero Side-Channel Attacks,” in NDSS, 2018.
[64] M. Schwarz, C. Maurice, D. Gruss, and S. Mangard, “Fantastic Timers
and Where to Find Them: High-Resolution Microarchitectural Attacks
in JavaScript,” in FC, 2017.
[65] M. Schwarz, M. Schwarzl, M. Lipp, and D. Gruss, “Netspectre: Read
arbitrary memory over network,” arXiv:1807.10535, 2018.
[66] P. Snyder, C. Taylor, and C. Kanich, “Most Websites Don’t Need to
Vibrate: A Cost-Benefit Approach to Improving Browser Security,” in
CCS, 2017.
[67] R. Spreitzer, “Pin skimming: Exploiting the ambient-light sensor in
mobile devices,” in Proceedings of the 4th ACM Workshop on Security
and Privacy in Smartphones & Mobile Devices, 2014.
[68] R. Spreitzer, F. Kirchengast, D. Gruss, and S. Mangard, “Procharvester:
Fully automated analysis of procfs side-channel leaks on android,” in
AsiaCCS, 2018.
[69] R. Spreitzer, G. Palfinger, and S. Mangard, “Scandroid: Automated side-
channel analysis of android apis,” in 11th ACM Conference on Security
and Privacy in Wireless and Mobile Networks, 2018.
[70] P. Stone, “Pixel Perfect Timing Attacks with HTML5,” Jun. 2013.
[Online]. Available: http://www.contextis.com/files/Browser Timing
Attacks.pdf
[71] A. Tatar, R. Krishnan, E. Athanasopoulos, C. Giuffrida, H. Bos, and
K. Razavi, “Throwhammer: Rowhammer Attacks over the Network and
Defenses,” in USENIX ATC, 2018.
[72] C. F. Torres, H. Jonker, and S. Mauw, “Fp-block: Usable web privacy
by controlling browser fingerprinting,” in ESORICS, 2015.
[73] V8 Team, “Launching ignition and turbofan,” 2017. [Online].
Available: https://v8project.blogspot.com/2017/05/launching-ignition-
and-turbofan.html
[74] J. Van Bulck, M. Minkin, O. Weisse, D. Genkin, B. Kasikci, F. Piessens,
M. Silberstein, T. F. Wenisch, Y. Yarom, and R. Strackx, “Foreshadow:
Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-
Order Execution,” in USENIX Security Symposium, 2018.
[75] T. Van Goethem, W. Joosen, and N. Nikiforakis, “The clock is still
ticking: Timing attacks in the modern web,” in CCS, 2015.
[76] A. Vastel, P. Laperdrix, W. Rudametkin, and R. Rouvoy, “Fp-scanner:
The privacy implications of browser fingerprint inconsistencies,” in
USENIX Security Symposium, 2018.
[77] P. Vila and B. K¨
opf, “Loophole: Timing attacks on shared event loops
in chrome,” in USENIX Security Symposium, 2017.
[78] B. Vitaris, “Firefox zero-day can be used to deanonymize tor users,”
2016. [Online]. Available: https://www.deepdotweb.com/2016/12/11/
firefox-zero- day-can- used-deanonymize-tor-users
[79] S. Weiser, A. Zankl, R. Spreitzer, K. Miller, S. Mangard, and G. Sigl,
“DATA - differential address trace analysis: Finding address-based side-
channels in binaries,” in USENIX Security Symposium, 2018.
[80] O. Weisse, J. Van Bulck, M. Minkin, D. Genkin, B. Kasikci, F. Piessens,
M. Silberstein, R. Strackx, T. F. Wenisch, and Y. Yarom, “Foreshadow-
NG: Breaking the Virtual Memory Abstraction with Transient Out-of-
Order Execution,” Technical report, 2018.
[81] Y. Yarom and K. Falkner, “Flush+Reload: a High Resolution, Low
Noise, L3 Cache Side-Channel Attack,” in USENIX Security Sympo-
sium, 2014.
15