Since the discovery of Spectre, a large number of hardware mechanisms fo...
Flushing the cache, using instructions like clflush and wbinvd, is commo...
We show how to infer deterministic cache replacement policies using
off-...
Many micro-architectural attacks rely on the capability of an attacker t...