Research Article
Leveraging KVM Events to Detect Cache-Based Side Channel Attacks in a Virtualization Environment
Figure 3
(a) Dataset distribution using the -fold cross-validation technique to find an AUC value from a pair of CSCa and non-CSCa datasets for the SVM classification. (b) An example of a 5-fold cross-validation ROC graph.
(a) |
(b) |