This should apply to a exploitation and defense against side channel attacks such as timing base attack and cache side-channel attack
From Wikipedia:
In computer security, a side-channel attack is any attack based on information gained from the implementation of a computer system, rather than weaknesses in the implemented algorithm itself (e.g. cryptanalysis and software bugs).