Y. Yarom and K. Falkner, FLUSH+RELOAD: A high resolution, low noise, L3 cache side-channel attack, USENIX Security, vol.14, p.719

D. Gruss, C. Maurice, K. Wagner, and S. Mangard, Flush+Flush: A fast and stealthy cache attack, DIMVA, pp.279-299, 2016.
DOI : 10.1007/978-3-319-40667-1_14

URL : http://arxiv.org/pdf/1511.04594

D. A. Osvik, A. Shamir, and E. Tromer, Cache attacks and countermeasures: The case of AES, pp.1-20, 2006.

Q. Ge, Y. Yarom, D. Cock, and G. Heiser, A survey of microarchitectural timing attacks and countermeasures on contemporary hardware, IACR Crypt. ePrint Arch, p.613, 2016.

S. A. , Cross-VM cache-based side channel attacks and proposed prevention mechanisms: A survey, Journal of Network and Computer Applications, pp.259-279, 2017.

X. Jin, H. Chen, X. Wang, Z. Wang, X. Wen et al., A simple cache partitioning approach in a virtualized environment, IEEE ISPA, p.519, 2009.
DOI : 10.1109/ispa.2009.47

H. Raj, R. Nathuji, A. Singh, and P. England, Resource management for isolation enhanced cloud services, pp.77-84, 2009.
DOI : 10.1145/1655008.1655019

F. Liu and R. B. Lee, Random fill cache architecture
DOI : 10.1109/micro.2014.28

T. Kim, M. Peinado, and G. Mainar-ruiz, STEALTHMEM: Systemlevel protection against cache-based side channel attacks in the cloud, USENIX Conference on Security Symposium, pp.11-11, 2012.

P. K. , Spectre attacks: Exploiting speculative execution, 2018.

M. Lipp, M. Schwarz, D. Gruss, T. Prescher, W. Haas et al., Meltdown

G. Irazoqui, M. S. Inci, T. Eisenbarth, and B. Sunar, Wait a minute! a fast, cross-VM attack on AES, p.17
DOI : 10.1007/978-3-319-11379-1_15

M. S. Inci, B. Gulmezoglu, G. Irazoqui, T. Eisenbarth, and B. Sunar, Cache attacks enable bulk key recovery on the cloud, CHES, 2016.

D. Gruss, R. Spreitzer, and S. Mangard, Cache template attacks: Automating attacks on inclusive last-level caches, 2015.

M. Godfrey and M. Zulkernine, Preventing cache-based side-channel attacks in a cloud environment, IEEE TCC, vol.2, issue.4, 2014.
DOI : 10.1109/tcc.2014.2358236

T. Zhang, Y. Zhang, and R. B. Lee, CloudRadar: A real-time sidechannel attack detection system in clouds, RAID, 2016.

Z. Zhou, M. K. Reiter, and Y. Zhang, A software approach to defeating side channels in last-level caches, ACM SIGSAC, 2016.
DOI : 10.1145/2976749.2978324

URL : http://dl.acm.org/ft_gateway.cfm?id=2978324&type=pdf

Z. Wang and R. B. Lee, New cache designs for thwarting software cache-based side channel attacks, ISCA, pp.494-505, 2007.
DOI : 10.1145/1273440.1250723

D. Cock, Q. Ge, T. Murray, and G. Heiser, The last mile: An empirical study of timing channels on seL4, ACM SIGSAC, 2014.

Y. Zhang, A. Juels, M. K. Reiter, and T. Ristenpart, Cross-VM side channels and their use to extract private keys, ACM CCS, 2012.
DOI : 10.1145/2382196.2382230

M. Godfrey and M. Zulkernine, A server-side solution to cache-based side-channel attacks in the cloud, IEEE CLOUD, 2013.
DOI : 10.1109/cloud.2013.21

D. Gruss, C. Maurice, A. Fogh, M. Lipp, and S. Mangard, Prefetch side-channel attacks: Bypassing smap and kernel ASLR, ACM CCS
DOI : 10.1145/2976749.2978356

M. Chiappetta, E. Savas, and C. Yilmaz, Real time detection of cachebased side-channel attacks using hardware performance counters, Appl. Soft Comput, 2016.
DOI : 10.1016/j.asoc.2016.09.014

URL : http://research.sabanciuniv.edu/34598/1/MarcoChiapetta_10124219.pdf

M. Payer, HexPADS: a platform to detect, 2016.
DOI : 10.1007/978-3-319-30806-7_9

Z. Allaf, M. Adda, and A. Gegov, A comparison study on Flush+Reload and Prime+Probe attacks on AES using machine learning approaches, 2017.

M. Bazm, T. Sautereau, M. Lacoste, M. Sudholt, and J. Menaud, Cache-based side-channel attacks detection through intel cache monitoring technology and hardware performance counters, 2018.
DOI : 10.1109/fmec.2018.8364038

URL : https://hal.archives-ouvertes.fr/hal-01762803

S. Peng, Q. Zhou, and J. Zhao, Detection of cache-based side channel attack based on performance counters, 2017.

M. Sabbagh, Y. Fei, T. Wahl, and A. A. Ding, SCADET: a side-channel attack detection tool for tracking Prime+ Probe, ICCAD, 2018.

D. Gullasch, E. Bangerter, and S. Krenn, Cache Games -bringing access-based cache attacks on AES to practice, IEEE SSP, 2011.
DOI : 10.1109/sp.2011.22

Y. Yarom, D. Genkin, and N. Heninger, CacheBleed: a timing attack on OpenSSL constant-time RSA, Journal of Crypt. Engg, 2017.
DOI : 10.1007/s13389-017-0152-y

, Performance application programming interface, 2018.

C. M. Bishop, Pattern Recognition and Machine Learning, 2006.

M. A. , Performance counters to rescue: A machine learning based safeguard against micro-architectural side-channel-attacks, 2017.