Research Article
Leveraging KVM Events to Detect Cache-Based Side Channel Attacks in a Virtualization Environment
Table 5
Comparison between clean, noisy, mimicry, and reduced probe frequency scenarios.
| ||||||||||||||||||||||||||||||||
(a) Number of encryptions needed to create a cache line pattern of the upper 4 bits of with less than 2% error (average of 10 attempts); (b) standard deviation of (a); (c) CPU task-clock needed to find the pattern for 100 encryptions (average of 10 attempts). |