Does Comodo protect you from Javascript side channel attacks?

For a decade, every major operating system has relied on a technique known as address space layout randomization to provide a first line of defense against malware attacks. By randomizing the computer memory locations where application code and data are loaded, ASLR makes it hard for attackers to execute malicious payloads when exploiting buffer overflows and similar vulnerabilities. As a result, exploits cause a simple crash rather than a potentially catastrophic system compromise.

Now, researchers have devised an attack that could spell the end of ASLR as the world knows it now. The attack uses simple JavaScript code to identify the memory addresses where system and application components are loaded. When combined with attack code that exploits vulnerabilities in browsers or operating systems, the JavaScript can reliably eliminate virtually all of the protection ASLR provides. The technique, which exploits what’s known as a side channel in the memory cache of all widely used modern CPUs, is described in a research paper published on Wednesday. The researchers have dubbed the technique ASLR Cache or AnC for short.

http://www.cs.vu.nl//~herbertb/download/papers/anc_ndss17.pdf
Which component of the HIPS in Comodo would protect a user, if any?

I’m going to interpret the lack of replies as a tacit admission of guilt. So I take that as a “no”.

Of course not, its a hardware issue not a software issue, best you can do is block javascript from websites you don’t trust using a browser add-on/extension.

I was hoping that the heuristic command-line analysis would also check javascript code since it already checks Visual Basic scripts and Java applications.

That setting is meant for standalone javascript that is saved and executed from a file and not javascript embedded in a web page.