Can anyone here with expertise on branch prediction security give insight into how the mitigation described in Section V compares to the one described in the paper linked below from ARM Research?<p><a href="https://jlee0517.github.io/publications/taco_final.pdf" rel="nofollow noreferrer">https://jlee0517.github.io/publications/taco_final.pdf</a>