Review Article

Survey of CPU Cache-Based Side-Channel Attacks: Systematic Analysis, Security Models, and Countermeasures

Figure 7

Workflow of Flush + Reload.