摘要: Event-driven programming (EDP) is the prevalent paradigm for graphical user interfaces, web clients, and it rapidly gaining importance server-side network programming. Central components of EDP are {\em event loops}, which act as FIFO queues that used by processes to store dispatch messages received from other processes. In this paper we demonstrate shared loops vulnerable side-channel attacks, where a spy process monitors loop usage pattern enqueueing events measuring time takes them be dispatched. Specifically, exhibit attacks against two central in Google's Chrome browser: I/O thread host process, multiplexes all actions, main renderer processes, handles rendering Javascript tasks. For each these loops, show how can monitored with high resolution low overhead, abused malicious purposes, such page identification, behavior detection, covert communication.