Errata dated Sept. 13, 2025

----------------------------

Based on the email from Prof. Gururaj dated August 31, 2025, and the recent arxiv paper[1], we verified the claim made by the authors of the arxiv paper [1], and we corroborate the findings for bug-1 in the source code of [2] because of which the results shown in Figure 17 change. We thank the authors of the arxiv paper [1] for this effort. Regarding bug-2, we still do not have any conclusive evidence as the experiments are underway. We will update once we verify the claim about bug-2.

[1] Chris Cao and Gururaj Saileshwar, ''Yet Another Mirage of Breaking MIRAGE: Debunking Occupancy-based Side-Channel Attacks on Fully Associative Randomized Caches", 2025, eprint=2508.10431, url=https://arxiv.org/abs/2508.10431

[2] A. Chakraborty, N. Mishra, S. Saha, S. Bhattacharya, and D. Mukhopadhyay, ''Systematic evaluation of randomized cache designs against cache occupancy,'' in 35th USENIX Security Symposium (USENIX Security 25), 2025.