hardware security vulnerabilities