Are coherent protocol states vulnerable to information leakage? Conference Paper uri icon