An attack that extracts secrets by analyzing physical leakage such as timing, power consumption, or electromagnetic emissions.