T Bourgeat, J Drean, Y Yang, L Tsai, J Emer… - IEEE/ACM International …, 2020 - par.nsf.gov
It is well known that there are micro-architectural vulnerabilities that enable an attacker to
use caches to exfiltrate secrets from a victim. These vulnerabilities exploit the fact that the …