During an investigation of anomalous CPU timing patterns on a compromised virtual machine hosted by a telecom provider, forensic analysts discover that the attacker launched a malicious VM on the same physical host as the target instance and extracted cryptographic keys by analyzing shared cache behavior. Which type of cloud computing attack does this technique represent?
Submit