Research Article

Leveraging KVM Events to Detect Cache-Based Side Channel Attacks in a Virtualization Environment

Figure 5

The evaluation scheme for each of the untrained scenario.