Figure 1 (IMAGE)
Caption
A schematic outlining how a hacker uses cache side-channel attacks.
Credit
Rei Ueno
Usage Restrictions
Reporters may use freely these materials in news coverage with appropriate credit information.
License
Original content