1. T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, “Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds,” in CCS, 2009, pp. 199–212.
2. Side-Channel Attacks: Ten Years after Its Publication and the Impacts on Cryptographic Module Security Testing YongBin Zhou, DengGuo Feng State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, 100080, China.
3. A. Shamir, E. Tramer. Acoustic cryptanalysis: on nosy people and noisy machines. Eurocrypt 2004 rump session, 2004.
4. Deepa G M et al, “An overview of acoustic side channel attack”, International Journal of Computer Science & Communication Networks, Vol 3(1), 15–20.
5. Godfrey, M., Zulkernine, M., “Preventing cache based side channel attacks in a cloud environment”, IEEE Transactions on Cloud Computing, Volume: 2, Issue: 4, Oct.-Dec. 1 2014.