1. C. Maurice , " Hello from the other side: SSH over robust cache covert channels in the cloud." in NDSS , 2017 . C. Maurice et al., "Hello from the other side: SSH over robust cache covert channels in the cloud." in NDSS, 2017.
2. F. Liu , " Last-level cache side-channel attacks are practical," in IEEE S&P , 2015 . F. Liu et al., "Last-level cache side-channel attacks are practical," in IEEE S&P, 2015.
3. Y. Yarom , " Recovering openssl ecdsa nonces using the flush+reload cache side-channel attack." IACR Cryptol ., 2014 . Y. Yarom et al., "Recovering openssl ecdsa nonces using the flush+reload cache side-channel attack." IACR Cryptol., 2014.
4. P. Kocher , " Spectre attacks: Exploiting speculative execution," in IEEE S&P , 2019 . P. Kocher et al., "Spectre attacks: Exploiting speculative execution," in IEEE S&P, 2019.
5. M. Lipp , " Meltdown: Reading kernel memory from user space," in USENIX Sec ., 2018 . M. Lipp et al., "Meltdown: Reading kernel memory from user space," in USENIX Sec., 2018.