« There are two main types of hardware attack. » ;
« One is to try to subvert the device in normal operation, generally by attaching something to an I/O port or to the PCB itself. »
« Another level of attack is to try to peer more deeply into the target in the hope of reverse-engineering the design or to pull out encryption keys and other sensitive data … »
www.newelectronics.co.uk/electronics-technology-ezine/Hackers-aims-for-the-jackpot/199672/183634/