These are attacks that are not standardized. Often rely on extra non-private information about devices. Examples Differential Power Analysis Circuit Characterization from Waveform View Circuit Characterization from Current Usage Timing Attack Replay Attack Black-Bag Cryptanalysis Rubber-host Cryptanalysis Man-In-The-Middle