% METHOD: Side Channel Analysis
% WHAT: A side channel attack is conducted by taking advantage of "leakage from boundaries". They are made possible by disregarding the abstraction of software into pure logic and focusing on the physical effects of the running of software which become backdoors to observe its functioning, hence re-affirming the materiality of software.
% HOW: As software runs on hardware, it emanates radio-magnetic waves, and you can, for example, build an antenna to capture these waves and then by analyzing them, reconstruct what the software is doing.
% WHEN:
% REMEMBER: "Hardware lives in the real world and real world properties lead to side channels."
% WHO: bad guys/good guys
% URGENCY:
% NOTE:
% WARNING: **engineers are good guys!**
% EXAMPLE: -
% https://www.tek.com/sites/default/files/media/image/119-4146-00%20Near%20Field%20Probe%20Set.png.jpg
% http://gallery.constantvzw.org/index.php/Techno-Galactic-Software-Observatory/PWFU3377
% http://gallery.constantvzw.org/index.php/Techno-Galactic-Software-Observatory/PWFU3381
% RELATESTO:
% SOURCE: This method is inspired by a talk by Thomas De Cnudde from the COSIC research group at the department of Electrical Engineering, KULeuven. Notes from his presentation: http://observatory.constantvzw.org/etherdump/side-channel-analysis.diff.html
% SHOW: tgsoimages.svg sidechannelanalysis N
% INFO: Thomas De Cnudde from the COSIC research group at the department of Electrical Engineering, KULeuven