These are attacks that are not standardized. Often rely on extra non-private information about devices. Examples Differential Power Analysis Circuit Characterization from Waveform View Circuit Characterization from Current Usage Timing Attack