1. Akram, A., Mushtaq, M., Bhatti, M. K., Lapotre, V., Gogniat, G.: Meet the Sherlock Holmes’ of side channel leakage: a survey of cache SCA detection techniques. IEEE Access 8, 70836-70860 (2020)
2. Allaf, Z., Adda, M., Gegov, A.: A comparison study on flush+ reload and prime+ probe attacks on AES using machine learning approaches. Adv. Intell. Syst. Comput. 650, 09 (2017)
3. Brasser, F., Müller, U., Dmitrienko, A., Kostiainen, K., Capkun, S., Sadeghi, A.R.: Software grand exposure: SGX cache attacks are practical. In: 11th USENIX Workshop on Offensive Technologies (WOOT 17), Vancouver, BC. USENIX Association (2017)
4. Canella, C., et al.: Fallout: leaking data on meltdown-resistant CPUs. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS). ACM (2019)
5. Chen, G., Chen, S., Xiao, Y., Zhang, Y., Lin, Z., Lai, T.H.: SgxPectre: stealing intel secrets from SGX enclaves via speculative execution. In: 2019 IEEE European Symposium on Security and Privacy (EuroS & P), pp. 142–157 (2019)