any attack based on information gained from the implementation of a computer system
power attack
In computer security, a side-channel attack is a type of security exploit that leverages information inadvertently leaked by a system—such as timing, power consumption, or electromagnetic or acoustic emissions—to gain unauthorized access … Wikipedia
🌐
Wikipedia
en.wikipedia.org › wiki › Side-channel_attack
Side-channel attack - Wikipedia
October 25, 2025 - In computer security, a side-channel attack is a type of security exploit that leverages information inadvertently leaked by a system—such as timing, power consumption, or electromagnetic or acoustic emissions—to gain unauthorized access to sensitive information.
🌐
NIST CSRC
csrc.nist.gov › glossary › term › side_channel_attack
Side-Channel Attack - Glossary | CSRC
An attack enabled by leakage of information from a physical cryptosystem. Characteristics that could be exploited in a side-channel attack include timing, power consumption, and electromagnetic and acoustic emissions. Sources: NIST SP 1800-21B under Side-Channel Attacks An attack enabled by ...
Discussions

Resources to learn more about Side-channel attacks?
Check this out https://www.zdnet.com/article/academics-steal-data-from-air-gapped-systems-using-pc-fan-vibrations/ There is also a list of various studies regarding side channel attacks. That Israeli team is world class regarding these More on reddit.com
🌐 r/hacking
7
57
November 7, 2021
cryptanalysis - How practical are side-channel attacks and how much of a concern are they? - Cryptography Stack Exchange
I see a lot of research in very sophisticated side-channel attacks on crypto systems. Most (but definitely not all) seem to follow a trend, namely, the crypto system does something very dumb like d... More on crypto.stackexchange.com
🌐 crypto.stackexchange.com
September 11, 2012
How practical are side channel attacks?
There's a number of common situations where side channel attacks are physically realizable: Smart cards in a card reader. The cryptography is running on the card, but the terminal might be malicious. Think fake ATM terminals. The card depends on the terminal for its entire power supply. Hence a power analysis is possible. JavaScript. When you're using a web browser, any web site can run JavaScript code on your browser. That web site might be malicious. It might try to do a timing side channel attack to find the secret key stored in your computer. Cloud servers. When you rent a cloud server, you're not usually renting a physical machine. You're renting time slices on a virtual machine. There's probably other users running their code on the same physical machine. A side channel attack can help an attacker pierce through their virtual machine and into those of other users. More on reddit.com
🌐 r/crypto
5
25
September 25, 2022
"Well known crimes" or vulns using side-channel attacks
https://stationhypo.com/2024/04/10/how-pizza-orders-foreshadowed-military-operations/ This one has to be one of my favorites. More on reddit.com
🌐 r/hacking
4
5
May 26, 2024
🌐
TechTarget
techtarget.com › searchsecurity › definition › side-channel-attack
What is a Side-Channel Attack? | Definition from TechTarget
These attacks usually try to exfiltrate sensitive information, including cryptographic keys, by measuring coincidental hardware emissions. A side-channel attack can also be called a sidebar attack or an implementation attack.
🌐
Rambus
rambus.com › home › blogs › primers › side-channel attacks explained: everything you need to know
Side-channel attacks explained: All you need to know -Rambus
June 10, 2024 - A side-channel attack (SCA) is a security exploit that attempts to extract secrets from a chip or a system. This can be achieved by measuring or analyzing various physical parameters.
🌐
Reddit
reddit.com › r/hacking › resources to learn more about side-channel attacks?
r/hacking on Reddit: Resources to learn more about Side-channel attacks?
November 7, 2021 -

For those who don't know here is a neat description of it from the wikipedia:

"In computer security, a side-channel attack is any attack based on information gained from the implementation of a computer system, rather than weaknesses in the implemented algorithm itself (e.g. cryptanalysis and software bugs). Timing information, power consumption, electromagnetic leaks or even sound can provide an extra source of information, which can be exploited."

It looks like a very fascinating branch of studies. I mean break and explore vulnerabilities from radio, electromagnetic leaks, audio, and other things are super groovy.

Also, I am particularly curious about it because I plan to include this as one of the major plot points in a book that I am planing inspired by Gibson, Stephenson, Watts, and Egan. Resumidely my idea is to write about a hacker group operating in the middle of the decade of 2030 composed of transhumanists, occultists, biohackers, and more other unique people. Who decide to migrate from AI-powered spear-phishing and identity theft to other forms of attacks like side-channel vectors. So I am looking to resources to learn more about this type of attack to satisfy my intellectual curiosity, thanks in advance.

Find elsewhere
🌐
Startupdefense
startupdefense.io › cyberattacks › side-channel-attack
Side-Channel Attacks: Methods Exploits and Defense Guide
Side-channel attacks are a method of extracting information from systems by observing their physical implementation rather than attacking the theoretical weaknesses in algorithms.
🌐
UTIMACO
utimaco.com › news › blog-posts › side-channel-attacks-when-strong-cryptography-not-enough
Side Channel Attacks: When Strong Cryptography is not Enough - Utimaco
November 4, 2025 - Instead, they exploited how modern processors handle data, leaking sensitive information through subtle fluctuations in timing and hardware behavior. These attacks were capable of extracting encryption keys, passwords, and other secrets - even when strong cryptography was in place. This strategic exploitation is a well-known example of what’s called a side channel attack.
🌐
Fortanix
fortanix.com › home › blog › 5 things you need to know about side channels and runtime encryption® with intel® sgx
5 Things you need to know about Side Channels | Fortanix
May 28, 2025 - Other strategies make the victim sensitive to measurements of side channel leakage and take defensive action based on this detection. By combining encryption of data in use with attestation, Intel® SGX offers secure computation in an untrusted environment, without exposing the data being operated upon. SGX enables applications to run in a protect execution environment, called an enclave. Interest inside channels attacks in the context of SGX arises because many kinds of attacks that are possible in conventional computing environments are no longer possible in SGX, leaving side channel attacks as one of few remaining attack vectors.
🌐
UCLouvain
perso.uclouvain.be › fstandae › PUBLIS › 42.pdf pdf
Introduction to Side-Channel Attacks Fran¸cois-Xavier Standaert⋆
Side-channel cryptanalysis is a new research area in applied · cryptography that has gained more and more interest since the mid- nineties. It considers adversaries trying to take advantage of the physi- cal specificities of actual cryptographic devices. These implementation- specific attacks ...
🌐
Asperiq
asperiq.com › article › side-channel-attacks
How to avoid the risks introduced by side-channel attacks - Asperiq
Attacks on specific chipsets and operating systems. They include Meltdown and Spectre, which were two vulnerabilities discovered by researchers in 2018, and which exploited the way in which chips were designed to manage data. Again, by timing how processes were managed, criminals could potentially ...
Top answer
1 of 3
33

Yes, side-channel attacks are practical and a real concern, if the past is indicative of the future.

I've been professionally involved with Smart Cards since the mid eighties, and have repeatedly witnessed deployed systems vulnerable to many forms of side-channel attacks; examples (I personally did 1 and 3):

  1. RAM buffer not cleared at reset, readable (with standard command Get Response), leaking state of previous PIN comparison, even if incrementing the PIN presentation counter had been inhibited (by hardware reset or/and removing EPROM programming voltage); that allowed recovering the 4-digit pins with expected 5000 attempts.
  2. Timing dependency where the duration of PIN presentation with permanent-memory writes inhibited leaks if the PIN is correct or not, to the same effect.
  3. Timing dependency where the duration of a comparison between values leaks the index of the first incorrect byte, allowing finding an $n$-byte value with expected $n\cdot2^7$ attempts instead of $2^{8\cdot n-1}$.
  4. Return to manufacturer test mode (by a software exploit, hardware modification or upset), allowing extraction of permanent memory content, including secrets (variant: normal software can be coerced to read the wrong location).
  5. Micro-probing to spy on bus lanes, leaking all kind of secret information.
  6. Simple Power Analysis directly leaking bits of exponent in RSA.
  7. Simple Power Analysis leaking activity (e.g. start programming of permanent memory), which combined with timing measurement leaks sensitive information (e.g. good or bad PIN, before that is recorded).
  8. Differential Power Analysis, allowing key recovery.
  9. Fault Injections (often considered side-channel attacks).

I have seen this causing great embarrassment to the suppliers of the vulnerable Smart Cards, and believe multiple reports that in the (distant) past, such vulnerabilities occasionally have been exploited on a large scale, especially in the field of Pay-TV with Smart Card.

More generally, when a device using cryptography is broken, this is often by means better described as a side channel attack than a cryptographic attack.

Addition: check this introductory article's part1 (alt.), part2 (alt.), part3; and this 2012 paper showing remote SPA and DPA attacks on Smart Phones and PDA.


If a cryptographic device/system can get in the hands of the adversary or otherwise become accessible enough (timing/Tempest/DEMA/SPA/DPA attacks can be remote to some degree), and it contains any information which confidentiality or even integrity matters (such as secret/private keys, authenticators, counters..), then one needs to pay close attention to side-channel attacks.

2 of 3
3

So, when building a system which uses cryptography (be it public or symmetric key), how practical of a concern are such attacks?

Any class of attacks becomes a practical concern the moment it starts to become attractive for an attacker with respect to other classes, and provided any successful attack brings rewards that outbalance the cost. That is true also for side-channel attacks; if your system can be compromised much more easily by other simpler means (e.g. social engineering, software bugs, test modes, you name it), spending money or time on adding protection against side-channel attacks may not make much sense. Same thing if the attack takes 1 year to mount and all you get is the ability to post on someone's Facebook wall.

And, what guidelines can be followed to determine if your systems needs protections (be they power analysis protections, emissions, timing, etc)?

A risk analysis is the first tool to guide you in identifying which attacks vectors are relevant (e.g. which system properties leak information to an attacker). For instance, if you trust the physical environment and its surrounding and your system is connected to external networks, you can ignore electromagnetic radiations, but not timing, padding oracle attacks, cache attacks and so on.

After that, you can implement some countermeasures where possible.

🌐
Twingate
twingate.com › blog › glossary › side-channel attack
What is a Side-Channel Attack? How It Works & Examples | Twingate
August 7, 2024 - A side-channel attack is a type of security exploit that leverages unintended information leakage from a physical cryptosystem. Unlike traditional attacks that target the cryptographic algorithm itself, side-channel attacks focus on the ...
🌐
Mitre
aadapt.mitre.org › techniques › ADT3027
Side-Channel Attack
Techniques describe the means by which adversaries achieve tactical goals. They represent “how” an adversary achieves a tactical objective by performing an action · Techniques may also represent “what” an adversary gains by performing an action. There can be multiple techniques in ...
🌐
NIST
csrc.nist.gov › csrc › media › events › physical-security-testing-workshop › documents › papers › physecpaper19.pdf pdf
Side-Channel Attacks: Ten Years After Its Publication and the
SCA attacks work because there is a · correlation between the physical measurements taken during computations (e.g., power · consumption, computing time, EMF radiation, etc.) and the internal state of the processing device, which is itself related to the secret key. It is the correlation between the side channel ...
🌐
Reddit
reddit.com › r/crypto › how practical are side channel attacks?
r/crypto on Reddit: How practical are side channel attacks?
September 25, 2022 -

I’m not familiar with side channel attacks. To measure the power or timing, it seems you need physical or remote access to the hardware simultaneously with the user. But at that point, you probably have access to the data in that machine (unless due to permissions).

How prevalent are side channel attacks? Are they mostly of academic interest?

🌐
ScienceDirect
sciencedirect.com › topics › computer-science › side-channel-attack
Side Channel Attack - an overview | ScienceDirect Topics
You might find these chapters and articles relevant to this topic. ... Side-channel attacks mainly steal information indirectly by exploiting unintended information leakage, also known as side-channel signals, which are inadvertently generated during computation.
🌐
Reddit
reddit.com › r/hacking › "well known crimes" or vulns using side-channel attacks
r/hacking on Reddit: "Well known crimes" or vulns using side-channel attacks
May 26, 2024 -

Hello,

I am looking for "well known" public examples of side channel vulnerabilities. Maybe in common products or data breaches or similar things. Of course I would also be interested in general cases aswell if they are compelling to non technical people in the field. Basically I am holding a presentation on side channels for a diverse audience and I would like to motivate the talk by giving common everyday or impactful examples, rather than just talking about directly about the one side channel I researched with its techncial breakdown straight away.

I would be especially interested if you know of any cases where side-channels were used in some capacity in comiting a crime (smart card cloning for example). That would enable me to talk about happened events with a date and a little story behind it which would hopefully make the technical part of my talk more engaging.

Thankyou for helping me out here if you happen to know any good examples

🌐
Microsoft
microsoft.com › home › ​​whisper leak: a novel side-channel attack on remote language models
​​Whisper Leak: A novel side-channel attack on remote language models | Microsoft Security Blog
November 7, 2025 - In this blog post, we present a novel side-channel attack against streaming-mode language models that uses network packet sizes and timings. This puts the privacy of user and enterprise communications with chatbots at risk despite end-to-end encryption.