Security and Communication Networks / 2018 / Article / Tab 5

Research Article

Leveraging KVM Events to Detect Cache-Based Side Channel Attacks in a Virtualization Environment

Table 5

Comparison between clean, noisy, mimicry, and reduced probe frequency scenarios.

Scenario (a)(b)(c)

Noisy (200 CU)17882.378.86
Mimicry R/W20910.5134.22
Reduced Probing freq.NANA761.83

(a) Number of encryptions needed to create a cache line pattern of the upper 4 bits of with less than 2% error (average of 10 attempts); (b) standard deviation of (a); (c) CPU task-clock needed to find the pattern for 100 encryptions (average of 10 attempts).