Methodology of Assessing Information Leakage through Software-Accessible Telemetries