“…Side-channels infer secrets (e.g. cryptographic keys) by observing power consumption [8,20,25,27], sound [5,12,33], electromagnetic (EM) emanations [2,17,24], behavior under faults [9,19], and performance of shared caches [6,36,38], instruction caches, branch predictors [1], etc. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage, and that copies bear this notice and the full citation on the first page.…”