For example, a side-channel attack on an e-bank, Real bank, which leaks its private key, could enable a fake bank, Bad bank, to pretend to be Real bank.
While software isolation mechanisms isolate memory used for different processes and different VMs, these mechanisms do not isolate the available smartphones.
Cache side-channel attacks thus constitute a serious security problem.