Eavesdropping on Semantic Communication: Timing Attacks and Countermeasures