摘要: Cross-site search (XS-search) attacks circumvent the same-origin policy and extract sensitive information, by using time it takes for browser to receive responses queries. This side-channel is usually considered impractical, due limited attack duration high variability of delays. may be true naive XS-search attacks; however, we show that use better tools facilitates effective attacks, exposing information efficiently precisely. We present evaluate three types tools: (1) appropriate statistical tests, (2) amplification timing side-channel, 'inflating' communication or computation, (3) optimized, tailored divide-and-conquer algorithms, identify terms from large 'dictionaries'. These techniques applicable in other scenarios. implemented evaluated against popular Gmail Bing services, several environments ethical experiments, taking careful, IRB-approved measures avoid exposure personal information.