Linked Presentation: SHELTER: Extending Arm CCA with Isolation in User SpaceCipherH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations