M. Bazm, M. Lacoste, M. Südholt, and J. Menaud, Side-channels beyond the cloud edge: New isolation threats and solutions, 2017 1st Cyber Security in Networking Conference (CSNet), 2017.
DOI : 10.1109/CSNET.2017.8241986

URL : https://hal.archives-ouvertes.fr/hal-01593144

G. Irazoqui, T. Eisenbarth, and B. Sunar, S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing -- and Its Application to AES, 2015 IEEE Symposium on Security and Privacy, pp.591-604, 2015.
DOI : 10.1109/SP.2015.42

Y. Yarom and K. Falkner, Flush+Reload: A High Resolution, Low Noise, L3 Cache Side-Channel Attack, 23rd USENIX Security Symposium, pp.719-732, 2014.

M. Chiappetta, E. Savas, and C. Yilmaz, Real time detection of cache-based side-channel attacks using hardware performance counters, Applied Soft Computing, vol.49, pp.1162-1174, 2016.
DOI : 10.1016/j.asoc.2016.09.014

T. Zhang, Y. Zhang, and R. B. Lee, CloudRadar: A Real-Time Side-Channel Attack Detection System in Clouds, International Symposium on Research in Attacks, Intrusions, and Defenses, pp.118-140, 2016.
DOI : 10.1145/2508859.2516741

M. Payer, HexPADS: A Platform to Detect ???Stealth??? Attacks, International Symposium on Engineering Secure Software and Systems, pp.138-154, 2016.
DOI : 10.1145/2508859.2516741

R. O. Duda, P. E. Hart, and D. G. Stork, Pattern classification, 2012.

M. E. Thomadakis, The architecture of the nehalem processor and nehalem-ep smp platforms, Resource, vol.3, issue.2, 2011.

O. Ac?içmez and C. ¸. Koç, Trace-Driven Cache Attacks on AES (Short Paper), International Conference on Information and Communications Security, pp.112-121, 2006.
DOI : 10.1007/11935308_9

J. Gallais, I. Kizhvatov, and M. Tunstall, Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations, International Workshop on Information Security Applications, pp.243-257, 2010.
DOI : 10.1007/978-3-540-28632-5_12

D. Gruss, C. Maurice, K. Wagner, and S. Mangard, Flush+Flush: A Fast and Stealthy Cache Attack, 2015.
DOI : 10.1145/2508859.2516741

M. Seaborn and T. Dullien, Exploiting the dram rowhammer bug to gain kernel privileges, 2015.

D. Gruss, C. Maurice, K. Wagner, and S. Mangard, Flush+Flush: A Fast and Stealthy Cache Attack, Detection of Intrusions and Malware, and Vulnerability Assessment, pp.279-299, 2016.
DOI : 10.1145/2508859.2516741

D. M. Powers, Evaluation: from precision, recall and f-measure to roc, informedness, markedness and correlation, 2011.