T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds, Proceedings of the 16th ACM conference on Computer and communications security, pp.199-212, 2009.

G. Irazoqui, T. Eisenbarth, and B. Sunar, S$a: A shared cache attack that works across cores and defies vm sandboxing-and its application to aes, 2015 IEEE Symposium on Security and Privacy, pp.591-604, 2015.
DOI : 10.1109/sp.2015.42

Y. Yarom and K. Falkner, Flush+Reload: A High Resolution, Low Noise, L3 Cache Side-Channel Attack, 23rd USENIX Security Symposium, pp.719-732, 2014.

M. Chiappetta, E. Savas, and C. Yilmaz, Real time detection of cache-based side-channel attacks using hardware performance counters, Applied Soft Computing, vol.49, pp.1162-1174, 2016.
DOI : 10.1016/j.asoc.2016.09.014

T. Zhang, Y. Zhang, and R. B. Lee, Cloudradar: A real-time side-channel attack detection system in clouds, International Symposium on Research in Attacks, Intrusions, and Defenses, pp.118-140, 2016.
DOI : 10.1007/978-3-319-45719-2_6

M. Payer, Hexpads: a platform to detect stealth attacks, International Symposium on Engineering Secure Software and Systems, pp.138-154, 2016.
DOI : 10.1007/978-3-319-30806-7_9

R. O. Duda, P. E. Hart, and D. G. Stork,

M. E. Thomadakis, The architecture of the nehalem processor and nehalem-ep smp platforms, Resource, vol.3, issue.2, 2011.

D. Gruss, C. Maurice, K. Wagner, and S. Mangard, Flush+ Flush: A Fast and Stealthy Cache Attack, 2015.
DOI : 10.1007/978-3-319-40667-1_14

URL : http://arxiv.org/pdf/1511.04594

D. Gruss, C. Maurice, K. Wagner, and S. Mangard, Flush+ flush: a fast and stealthy cache attack, Detection of Intrusions and Malware, and Vulnerability Assessment, pp.279-299, 2016.
DOI : 10.1007/978-3-319-40667-1_14

URL : http://arxiv.org/pdf/1511.04594

D. M. Powers, Evaluation: from precision, recall and f-measure to roc, informedness, markedness and correlation, 2011.

, Flush+Flush side-channel attack github repository