“…If branch predictor is flushed on context switch attacks such as Spectre v2, Jump-over-ASLR and others can be fully mitigated. Soure and target branch addresses and calls, taken/nontaken patterns [3], [16], [18], [36], [39] Timing channel due to A controlling predictions in V [3], speculative execution attacks [13], [33], [36], [46], [67], [85] V's jmp taken/nontaken [3] and call pattens, branch instruction virtual address [33] Timing channel due to A forcing static default predictions [3], speculatively execute gadget at static prediction address [ Intel has proposed a set of microcode-based protections which aim to mitigate speculative execution attacks on legacy CPUs by restricting BPU structure sharing. These protections include Indirect Branch Restricted Speculation (IBRS), Indirect Branch Prediction Barrier (IBPB), and Single Threaded Indirect Branch Prediction (STIBP) [27].…”