Electronic devices found in a smart home, automobile, airplane, medical, and industrial applications are becoming more capable of on-the-spot processing information with their own embedded processors. While embedded processors make life easier, they also open the door to theft or corruption of our sensitive data. Malign actors can monitor power or radiation signatures in and around a device, and discover its secrets using side-channel attacks.