I have a big problem to figure how the security model in papers about side-channel are relevant (briefly the attacker has a partial access to the hardware).
Why these breaches are so seriously considered?
Is there any known and famous story of a system attacked with these techniques?