Nor can software-based solutions guarantee security, because software has no direct control over hardware caches and cannot prevent hardware or system asynchronous events that modify the cache state.
Nor can software-based solutions guarantee security, because software has no direct control over hardware caches and cannot prevent hardware or system asynchronous events that modify the cache state. Consider two examples.