no code implementations • 11 Feb 2018 • Caroline Trippel, Daniel Lustig, Margaret Martonosi
But more importantly, both Prime attacks exploit invalidation-based coherence protocols to achieve the same level of precision as a Flush+Reload attack.
Cryptography and Security Hardware Architecture