Research Article

Leveraging KVM Events to Detect Cache-Based Side Channel Attacks in a Virtualization Environment

Algorithm 4

An example of a mimicry attempt by reducing the spy frequency.
start = rdtsc  ;
While  (1)
flush_flush  (addr + offset);
for  (int  i=0; i<1000, ++i)
sched_yield  ;