Review Article

Survey of CPU Cache-Based Side-Channel Attacks: Systematic Analysis, Security Models, and Countermeasures

Figure 9

Workflow of Flush + Flush.