Computer systems often provide hardware support for isolation mechanisms such as privilege levels, virtual memory, or enclaved execution. Over the past years, several successful software-based side-channel attacks have been developed that break, at least significantly weaken, these offer. Extending a processor with new architectural micro-architectural features brings risk of introducing attack...