This research thread provides a completely new way of thinking into the use of side channel leakage. Currently, side channel leakage is mainly used to attempt to break into systems and algorithms. However, we have proposed to use it to attest and fingerprint a platform and to make sure that the secure application execution is verified. Our research bridges the gap between hardware and software proposals, and they are also aimed at enhancing our envisaged collaboration with the RHUL electronics engineering department.