“…For example, stateof-the-art defences that block the transmission of speculative accessed data to potential side-channel instructions, such as NDA [48], STT [52,53], and others [4,5,13,26], are ineffective in this context, because, under microarchitectural replay, the side-channel instructions may actually be in the correct path of execution and can also be fed with non-speculative data. At the same time, other defences that are restricted on data dependencies, such as InvisiSpec [50], Delay-on-Miss [37,39], and many others [1,19,20,22,36,38,43], only focus on specific side-channels, under the assumption that not all side-channels can be exploited as easily. However, the effectiveness of microarchitectural replay attacks comes precisely from the fact that they can be used to amplify and successfully mount hard to exploit attacks, also making these speculative side-channel defences unfit for our purposes.…”