...
Currently, complete mitigation requires support from the underlying Operating Systemoperating system. For instance, if swapping out of sensitive data is an issue, a secure operating system that disables swapping and hibernation is indispensable.
...