1 code implementation • 2 Oct 2018 • Pepe Vila, Boris Köpf, José Francisco Morales
Many micro-architectural attacks rely on the capability of an attacker to efficiently find small eviction sets: groups of virtual addresses that map to the same cache set.
Cryptography and Security