... Leakage could be via shared state [3,32,44,80] or via contention on either the limited state storage space [27,49,58,60] or the bandwidth of microarchitectural components [2,10,82]. Exploiting this leakage, multiple side-channel attacks have been presented, extracting cryptographic keys [2,10,11,25,32,49,58,60,65,80,82], monitoring user behavior [29,33,57,64,69], and extracting other secret information [7,36,79]. Side-channel attacks were shown to allow leaking between processes [32,49,58,60,80], web browser tabs [24,57,69], virtual machines [37,49,80,86], and other security boundaries [7,18,36,44]. ...