How should cache handling be accomplished in order to minimize the ability of the attacker to deliver a payload through the cache?
At least 2 references.
https://ebrary.net/84291/computer_science/securing_systems_applied_security_architecture_and_threat_models