Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds, Proceedings of the 16th ACM conference on Computer and communications security, pp.199-212, 2009. ,
S$a: A shared cache attack that works across cores and defies vm sandboxing-and its application to aes, 2015 IEEE Symposium on Security and Privacy, pp.591-604, 2015. ,
DOI : 10.1109/sp.2015.42
Flush+Reload: A High Resolution, Low Noise, L3 Cache Side-Channel Attack, 23rd USENIX Security Symposium, pp.719-732, 2014. ,
Real time detection of cache-based side-channel attacks using hardware performance counters, Applied Soft Computing, vol.49, pp.1162-1174, 2016. ,
DOI : 10.1016/j.asoc.2016.09.014
Cloudradar: A real-time side-channel attack detection system in clouds, International Symposium on Research in Attacks, Intrusions, and Defenses, pp.118-140, 2016. ,
DOI : 10.1007/978-3-319-45719-2_6
Hexpads: a platform to detect stealth attacks, International Symposium on Engineering Secure Software and Systems, pp.138-154, 2016. ,
DOI : 10.1007/978-3-319-30806-7_9
,
The architecture of the nehalem processor and nehalem-ep smp platforms, Resource, vol.3, issue.2, 2011. ,
Flush+ Flush: A Fast and Stealthy Cache Attack, 2015. ,
DOI : 10.1007/978-3-319-40667-1_14
URL : http://arxiv.org/pdf/1511.04594
Flush+ flush: a fast and stealthy cache attack, Detection of Intrusions and Malware, and Vulnerability Assessment, pp.279-299, 2016. ,
DOI : 10.1007/978-3-319-40667-1_14
URL : http://arxiv.org/pdf/1511.04594
Evaluation: from precision, recall and f-measure to roc, informedness, markedness and correlation, 2011. ,
, Flush+Flush side-channel attack github repository