Side-Channel Attacks
These attacks are based on info gained from the implementation of the underlying computer system instead of a specific weakness in the technology. The attacker aims to gather information from or influence an application/system by exploiting effects of the system or hardware. Side-channel attacks are used to exfiltrate credentials, keys and other sensitive information.
Last updated