Working with colleagues from Princeton University and from NICTA we demonstrate how to implement last-level cache side channels, measure their capacity and demonstrate that their resolution is sufficient for leaking cryptographic keys between co-located virtual machines and across multiple processor cores.
F. Liu, Y. Yarom, Q. Ge, G. Heiser, and R.B. Lee, Last-Level Cache Side-Channel Attacks are Practical. Accepted for IEEE Symposium on Security and Privacy 2015, May 2015.