Review Article

Survey of CPU Cache-Based Side-Channel Attacks: Systematic Analysis, Security Models, and Countermeasures

Figure 6

Workflow of Prime + Probe.