These are attacks that are not standardized. Often rely on extra non-private information about devices. Examples Differential Power Analysis