Semal, BenjaminMarkantonakis, KonstantinosAkram, Raja NaeemKalbantner, JanZhou, JianyingAhmed, Chuadhry MujeebConti, MauroLosiouk, EleonoraAu, Man HoBatina, LejlaLi, ZhouLin, JingqiangLuo, BoMajumdar, SuryadiptaMeng, WeizhiOchoa, MartínPicek, StjepanPortokalidis, GeorgiosWang, CongZhang, Kehuan2022-03-182022-03-182020-10-14Semal, B, Markantonakis, K, Akram, R N & Kalbantner, J 2020, A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Service. in J Zhou, C M Ahmed, M Conti, E Losiouk, M H Au, L Batina, Z Li, J Lin, B Luo, S Majumdar, W Meng, M Ochoa, S Picek, G Portokalidis, C Wang & K Zhang (eds), Applied Cryptography and Network Security Workshops : ACNS 2020 Satellite Workshops AIBlock, AIHWS, AIoTS, Cloud S &P, SCI, SecMT, and SiMLA Rome, Italy, October 19–22, 2020, Proceedings. vol. 12418, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12418 , Springer , Cham, Switzerland, pp. 360-377, CLOUD S &P 2020, Rome, Italy, 19/10/20. https://doi.org/10.1007/978-3-030-61638-0_20conference978-3-030-61637-3978-3-030-61638-00302-9743ORCID: /0000-0002-2789-4628/work/115777599https://hdl.handle.net/2164/1824418301604engCovert channelMicroarchitectural attackCloud privacyVulnerabilityVulnerability studyQA75 Electronic computers. Computer scienceTheoretical Computer ScienceGeneral Computer ScienceQA75A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-ServiceConference item10.1007/978-3-030-61638-0_20http://www.scopus.com/inward/record.url?scp=85094103095&partnerID=8YFLogxKhttps://pure.royalholloway.ac.uk/en/publications/a-study-on-microarchitectural-covert-channel-vulnerabilities-in-i