Fig. 5From: Malware Guard Extension: abusing Intel SGX to conceal cache attacksHistogram showing the runtime of the prime step for cache activity in the same set and no cache activity in the same setBack to article page