You share, you leak: Practical side-channel attacks and defenses in modern clouds