« the first network-based cache attack on the processor’s last-level cache »
This attack could be used jointly with a keystroke timing attack to extract SSH keystrokes from a neighbor instance