Re: Another simple mitigation
No - ASLR randomises the layout of logical memory space to prevent you guessing where in memory key data structures such as the heap/stack lie in order to cause executable code to be placed onto them.
Spectre looks at memory residing within processor cache across processes caused by the delay between an instruction generating a memory access violation and the instructions in the speculative execution pipeline being flushed. i.e. the "physical" cache lines vs the logical addresses.