Journals
Publish with us
Publishing partnerships
About us
Blog
Security and Communication Networks
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Security and Communication Networks
/
2018
/
Article
/
Alg 4
/
Research Article
Leveraging KVM Events to Detect Cache-Based Side Channel Attacks in a Virtualization Environment
Algorithm 4
An example of a mimicry attempt by reducing the spy frequency.
…
start = rdtsc
;
While
(
1)
flush
_
flush
(addr + offset)
;
for
(int
i=0; i<1000, ++i)
sched_yield
;
…