The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, cryptographic implementations. Such implementations, however, are microarchitecture-specific, and cannot be implemented without an in-depth structural knowledge the CPU memory information leakage patterns; a description such leakages is presently not disclosed by any processor design company. In this w...