These are attacks that are not standardized. Often rely on extra non-private information about devices.

Examples