An Approach for Isolating the Sources of Information Leakage Exploited in Cache-Based Side-Channel Attacks.

Ali Can AticiCemal YilmazErkay Savas
Published in: SERE (Companion) (2013)