1. Omega. http://www.cs.umd.edu/projects/omega/. Omega. http://www.cs.umd.edu/projects/omega/.
2. Xbox 360 timing attack. http://beta.ivc.no/wiki/ index.php/Xbox 360 Timing Attack 2007. Xbox 360 timing attack. http://beta.ivc.no/wiki/ index.php/Xbox 360 Timing Attack 2007.
3. A few important facts regarding oauth security. http://oauthlib.readthedocs.io/en/latest/oauth1/ security.html 2012. A few important facts regarding oauth security. http://oauthlib.readthedocs.io/en/latest/oauth1/ security.html 2012.
4. Oauth protocol hmac byte value calculation timing disclosure weakness. https://osvdb.info/OSVDB-97562 2013. Oauth protocol hmac byte value calculation timing disclosure weakness. https://osvdb.info/OSVDB-97562 2013.
5. String Constraints for Verification