Research Article

Leveraging KVM Events to Detect Cache-Based Side Channel Attacks in a Virtualization Environment

Algorithm 5

An example of a mimicry attempt by introducing a diversion function.
start = rdtsc  ;
While  (1)
flush_flush  (addr + offset);
diversion_func  ;
sched_yield  ;