In this dissertation we study some of the problems arising on computer systems that leak information through execution time. We study several instances of how these leaks can be used to both learn secrets—of a confidential computation—and models—of an underlying component—, and we provide examples that violate previous assumptions about systems’ security or about the attackers’ capabilities. In particular, we study time leakage under three different scenarios, providing multiple independent contributions in each of them: • First, we show that event-driven software systems are susceptible to sidechannel attacks. The key observation is that event loops form a resource that can be shared between mutually distrusting programs. Hence, contention...