Towards automatic analysis of microarchitectural attacks