Once inside ...
"The threat model assumes the attacker knows the CPU model of the target machine and has obtained DRAM address mappings using a reverse engineering tool. It also assumes that an unprivileged attacker can execute programs on the victim's machine."
Interesting as a piece of theoretical research, but once the perp can do all this (indeed merely a subset of this) they can do almost anything they want without resorting to complex silicon-specific attack vectors. Most organisations are so utterly wide open that they can be breached using free to download tools off the web, so these advanced techniques are actually unneccessary as well as hard to accomplish.