Hardware

Bootloader

Jailbreak

Glitching

Side channel attack

Power analysis

Timing attack

Reverse engineering

JTAG

Exploit