On the Fundamentals of Self-Fulfilling Speculative Attacks