3.2 Passive Implementation Attacks and Countermeasures