Problem
1) Explain how attackers can exploit conditional branch misprediction to leak information/secret keys on modern CPU architectures. What are the steps involved in these attacks? Describe an example attack that uses microarchitecture side-channels.
2) Explain how differential power analysis (DPA) method works to attack AES algorithms. What is the key difference compared to Simple Power Analysis (SPA)? Give another example for Side Channel Attacks using power measurements.