“…randomized cache line mapping to make the attacks computationally impractical [91], [79], [80], [98], [89], [97], [64], [63] or 2.) cache partitioning to provide strict isolation [30], [51], [103], [62], [22], [34], [105], [48], [99], [58], [6], [96], [52], [97], [23]. We discuss the works most related to CHUNKED-CACHE in more detail in Section VII.…”