Can timing attacks be performed with Inspector?
Yes. Timing attacks are mostly executed in combination with so-called SPA (Simple Power Analysis). The analyst compares a few traces and by looking at their differences she might infer information related to the key. The precision of finding timing differences depends on the oscilloscope, which could as little as 1 ns. This could for instance reveal a timing problem in PIN or password verification that allows an attacker to retrieve this code with a few attempts. In the context of cryptography, timing attacks are known for parity checks in symmetric algorithms (like DES), or for by measuring execution time of asymmetric algorithms (like RSA). Timing attacks can be automated (similar to DPA), but this is very much dependent on the sort of timing leak. Inspector allows you to implement such a specific attack in a straightforward manner.