Similar Items: Attacker Control and Impact for Confidentiality and Integrity