In our research we explore whether it is possible to compromise confidentiality and integrity of computation on modern microarchitectures. Some examples of our research shows that different active microarchitectural elements (such as Page Table Walkers) can leak sensitive information and certain microarchitectural buffers, deep inside a CPU pipeline, are vulnerable to speculative execution attacks.