1. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds;Ristenpart,2009
2. Cross-VM side channels and their use to extract private keys;Zhang,2012
3. Z. Wu, Z. Xu, H. Wang, Whispers in the hyper-space: high-speed covert channel attacks in the Cloud, in: USENIX Security Symposium, 2012, pp. 159–173.
4. M. Lipp, M. Schwarz, D. Gruss, T. Prescher, W. Haas, S. Mangard, P. Kocher, D. Genkin, Y. Yarom, M. Hamburg, Meltdown, 2018, arXiv preprint arXiv:1801.01207.
5. Spectre attacks: Exploiting speculative execution;Kocher,2018