Searching protocol for "branch-prediction"
Model cache and pipeline behavior across eras.
Analyze microarchitectural attack surfaces.