Category:Computer security exploits
Category:Speculative execution
Category:Hardware bugs
Category:Side-channel attacks