1 Introduction
The increasing ubiquity of computing devices is continuing to offer exciting new applications to consumers, but also multiplies the number of security issues a system designer must consider. Since such devices will be carried into and used in hostile environments and often house sensitive information, for example, identity-related tokens or financial information, the threat of attack is significant. This threat is magnified by both the potential pay-off and the level of anonymity that side-channel attacks allow.