== Conclusion ==
This tutorial has demonstrated the use of the power side-channel for performing timing attacks. A bootloader with a simple passwordproof-based security system of-concept is brokenperformed against a bootloader, although a complete example is not presented. In addition you have learned about It is left as an exercise to the scripting support in the ChipWhisperer-Capture softwarereader to script a complete attack for this example.
{{Template:Tutorials}}