, Performance considerations, 2013.

, Application Note 176-How a GIC works, 2007.

, ARM Generic Interrupt Controller Architecture version 2.0, 2013.

P. Bao, J. Pierce, S. Whittaker, and S. Zhai, Smart phone use by non-mobile business users, Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services, 2011.

C. Bienia, S. Kumar, J. P. Singh, and K. Li, The parsec benchmark suite: Characterization and architectural implications, Proceedings of the 17th International Conference on Parallel Architectures and Compilation Techniques, 2008.

D. P. Bovet and M. Cesati, Understanding the Linux Kernel, 2005.

L. Cai and H. Chen, TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion, USENIX Workshop on Hot Topics in Security-HotSec, 2011.

, Consumer Survey: Password Habits, 2012.

A. Das, J. Bonneau, M. Caesar, N. Borisov, and X. Wang, The tangled web of password reuse, NDSS'14, 2014.

W. Diao, X. Liu, Z. Li, and K. Zhang, No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis, S&P'16, 2016.

S. Gaw and E. W. Felten, Password management strategies for online accounts, SOUPS'06, 2006.

Q. Ge, Y. Yarom, D. Cock, and G. Heiser, A Survey of Microarchitectural Timing Attacks and Countermeasures on Contemporary Hardware, Journal of Cryptographic Engineering, pp.1-27, 2016.

N. Gondhia, Samsung galaxy s7 battery life review, 2016.

. Google, Android o prevents access to /proc/stat, 2017.

D. Gruss, J. Lettner, F. Schuster, O. Ohrimenko, I. Haller et al., Strong and efficient cache side-channel protection using hardware transactional memory, USENIX Security Symposium, 2017.

D. Gruss, C. Maurice, K. Wagner, and S. Mangard, Flush+Flush: A Fast and Stealthy Cache Attack, 2016.

D. Gruss, R. Spreitzer, and S. Mangard, Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches, USENIX Security Symposium, 2015.

D. Gullasch, E. Bangerter, and S. Krenn, Cache Games-Bringing Access-Based Cache Attacks on AES to Practice, S&P'11, 2011.

S. Idrus, E. Cherrier, C. Rosenberger, and P. Bours, Soft Biometrics for Keystroke Dynamics: Profiling Individuals While Typing Passwords, vol.45, pp.147-155, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01011801

M. S. Inci, B. Gulmezoglu, G. Irazoqui, T. Eisenbarth, and B. Sunar, Cache Attacks Enable Bulk Key Recovery on the Cloud, CHES'16, 2016.

. Intel, 82093AA I/O Advanced Programmable Interrupt Controller (IOAPIC), 1996.

, Intel R 64 and IA-32 Architectures Software Developer s Manual, vol.3, 2014.

S. Jana and V. Shmatikov, Memento: Learning Secrets from Process Footprints, S&P'12, 2012.
DOI : 10.1109/sp.2012.19

URL : http://www.cs.utexas.edu/%7Eshmat/shmat_oak12memento.pdf

Y. Jang, S. Lee, and T. Kim, Breaking Kernel Address Space Layout Randomization with Intel TSX, CCS'16, 2016.
DOI : 10.1145/2976749.2978321

N. Kralevich, Honey, i shrunk the attack surface, 2017.

D. G. Lab, Global app power consumption report 2016, h1, 2016.

P. Lee, W. Tsui, and T. Hsiao, The Influence of Emotion on Keyboard Typing: An Experimental Study Using Auditory Stimuli, PLOS ONE, vol.10, pp.1-16, 2015.

, Linux man-pages project, 2016.

M. Lipp, D. Gruss, M. Schwarz, D. Bidner, C. Maurice et al., Practical keystroke timing attacks in sandboxed javascript, ESORICS'17, 2017.

M. Lipp, D. Gruss, R. Spreitzer, C. Maurice, and S. Mangard, ARMageddon: Cache Attacks on Mobile Devices, USENIX Security Symposium, 2016.

F. Liu, Y. Yarom, Q. Ge, G. Heiser, and R. B. Lee, Last-Level Cache Side-Channel Attacks are Practical, S&P'15, 2015.
DOI : 10.1109/sp.2015.43

. Lwn, The high-resolution timer API, 2006.

J. Ma, W. Yang, M. Luo, and N. Li, A study of probabilistic password models, S&P'14, 2014.

C. Maurice, N. L. Scouarnec, C. Neumann, O. Heen, and A. Francillon, Reverse Engineering Intel Complex Addressing Using Performance Counters, RAID'15, 2015.
DOI : 10.1007/978-3-319-26362-5_3

L. W. Mcvoy and C. Staelin, lmbench: Portable tools for performance analysis, USENIX ATC'96, 1996.

W. Melicher, B. Ur, S. M. Segreti, S. Komanduri, L. Bauer et al., Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks, 2016.

. Microsoft, Acpi system description tables, 2016.

A. Narayanan and V. Shmatikov, Fast dictionary attacks on passwords using time-space tradeoff, CCS'05, 2005.
DOI : 10.1145/1102120.1102168

P. Norvig, English letter frequency counts: Mayzner revisited, 2013.

Y. Oren, V. P. Kemerlis, S. Sethumadhavan, and A. D. Keromytis, The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications, CCS'15, 2015.

D. A. Osvik, A. Shamir, and E. Tromer, Cache Attacks and Countermeasures: the Case of AES, 2006.

C. , Cache missing for fun and profit, Proceedings of BSDCan, 2005.

P. Pessl, D. Gruss, C. Maurice, M. Schwarz, and S. Mangard, DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks, USENIX Security Symposium, 2016.

S. Pinet, J. C. Ziegler, and F. Alario, Typing is writing: Linguistic properties modulate typing execution, Psychon Bull Rev, vol.23, issue.6, pp.1898-1906, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01477291

. Qualcomm, Snapdragon mobile processors and chipsets, 2017.

T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds, CCS'09, 2009.

R. Shay, S. Komanduri, P. G. Kelley, P. G. Leon, M. L. Mazurek et al., Encountering stronger password requirements: User attitudes and behaviors, SOUPS'10, 2010.

P. Shrestha, M. Mohamed, and N. Saxena, Slogger: Smashing Motion-based Touchstroke Logging with Transparent System Noise, 2016.

L. Simon, W. Xu, and R. Anderson, Don't Interrupt Me While I Type: Inferring Text Entered Through Gesture Typing on Android Keyboards, Proceedings on Privacy Enhancing Technologies, 2016.

D. X. Song, D. Wagner, and X. Tian, Timing Analysis of Keystrokes and Timing Attacks on SSH, USENIX Security Symposium, 2001.

G. The and . Team, GTK+ Features, 2016.

R. Veras, C. Collins, and J. Thorpe, On semantic patterns of passwords and their security impact, NDSS'14, 2014.

P. Vila and B. Köpf, Loophole: Timing attacks on shared event loops in chrome, USENIX Security Symposium, 2017.

R. Wash, R. Rader, R. Berman, and Z. Wellmer, Understanding password choices: How frequently entered passwords are re-used across websites, SOUPS'16, 2016.

M. Weir, S. Aggarwal, B. D. Medeiros, and B. Glodek, Password cracking using probabilistic context-free grammars, S&P'09, 2009.

M. Winnick and J. Mons, Mobile touches: a study on humans and their tech, 2016.

X. Org-foundation, xorg documentation, 2014.

Y. Yarom and K. Falkner, Flush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack, USENIX Security Symposium, 2014.

Y. Yarom, Q. Ge, F. Liu, R. B. Lee, and G. Heiser, Mapping the Intel Last-Level Cache, Cryptology ePrint Archive, pp.1-12, 2015.

K. Zhang and X. Wang, Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems, USENIX Security Symposium, 2009.