“…Microarchitectural attacks. While early microarchitectural attacks such as classic cache side-channel attacks [69,98] or even more recent attacks [5,24,37,38,67,93] primarily focus on breaking crypto implementations, there is a large body of work on microarchitectural attacks to support software exploitation. Such attacks typically use side-channel disclosure to mimic limited memory read primitives [12,26,39] and fault attacks like Rowhammer to mimic limited memory write primitives [12,20,28,29,42,72,76,85,86,92].…”