Review Article

Survey of CPU Cache-Based Side-Channel Attacks: Systematic Analysis, Security Models, and Countermeasures

Figure 2

Workflow of cache-based side-channel attacks.