These are attacks that are not standardized. Often rely on extra non-private information about devices. Examples Differential Power Analysis Circuit Characterization from Waveform View Circuit Characterization from Current Usage Timing Attack Replay Attack Black-Bag Cryptanalysis Rubber-hose Cryptanalysis Man-In-The-Middle