As mobile systems gain new capabilities, their security also needs to increase, to mitigate piracy, fraud and identity theft. Specifically, side-channel resistance needs to be accounted for both hardware and software implementations of cryptography, to protect secret key material against key extraction attacks. Furthermore, such implementations need to be certified as side-channel resistant to compete on the market. Side-channel analysis is not a new discipline. However, that side-channel analysis was mainly developed in the smartcard domain raises questions: do existing side-channel attack vectors and mitigations apply to modern targets, e.g., embedding a system-on-chip of increasing complexity? How does the complexity of modern targets impact both attack and mitigation techniques? In this talk I summarize our findings and the lessons learned to address the questions above.