An attack similar to a man-in-the-middle attack, where instead of completely controlling a communication channel, the attacker only has regular access to the communication channel, enabling the attacker to read traffic and insert new messages, but not to modify or delete messages sent by other participants. A man-on-the-side attack relies on a timing advantage to ensure that the attacker’s response to the victim’s request arrives before the legitimate response.