Hardware

Bootloader

Jailbreak

Side channel attack

Glitching

Power analysis

Timing attack

Reverse engineering

JTAG

Exploit