“…With a decreasing number of available targets for software attacks, the attention of adversaries is more frequently drawn to exploitable weaknesses in hardware. Although hardware attacks such as microarchitectural side channels [1], [3], [6], [19], [26], [44], [56], [57], covert channels [17], [24], [49], [54], and power analysis [2], [34], [48], [50], [55] attacks have been known for a long time, only recently did researchers demonstrate the true power of microarchitectural attacks with newly discovered speculative execution attacks, such as Meltdown [42], [73] and Spectre [13], [32], [33], [35], [47], [67]. These attacks are based on speculative (transient) execution, a performance optimization technique present in nearly all of today's processors.…”