“…In response to the discovery of Spectre, a wide range of countermeasures has already been proposed [3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20]. It is an important and difficult challenge to understand the trade-offs offered by these mitigations in terms of security, performance, and applicability to legacy hardware or software.…”