. . . "All the attacks where processes snoop on each other using things such as cache miss to e.g. deduce the private part of a RSA key after another process performed a crypto operation apply to virtual machines on commodity hardware." .