1. http://www.usatoday.com/story/tech/2014/09/24/data-breach-companies-60/16106197/
.
2. CLOUD SECURITY ALLIANCE The Treacherous 12—Cloud Computing Top Threats in 2016.
3. Osvik, D. A., Shamir, A., & Tromer, E. (2006). Cache attacks and countermeasures: The case of AES. In D. Pointcheval (Ed.), Topics in cryptology CT-RSA 2006. CT-RSA 2006. Lecture notes in computer science (Vol. 3860). Berlin: Springer.
4. Godfrey, M. M., & Zulkernine, M. (2014). Preventing cache-based side-channel attacks in a cloud environment. IEEE Transactions on Cloud Computing, 2(4), 395–408.
5. Xu, Y., Bailey, M., Jahanian, F., Joshi, K., Hiltunen, M., & Schlichting, R. (2011). An exploration of L2 cache covert channels in virtualized environments. In Proceedings of the 3rd ACM workshop on Cloud computing security workshop (CCSW ’11) (pp. 29–40). New York, NY: ACM.