Describir: The Effect of Virtual Processor Configurations on the Bounds Check Bypass Attack