Known hardware or system flaws are exploited by the attacker.
Examples include a hardware flaw permitting a power-down instruction to be
executed by a non-privileged user, causing an operating system to use results
of a known calculation error in a particular microprocessor for a key
decision, and sending a packet with a parameter that is improperly handled
by a network component.
Complexity: Discovering hardware flaws is, in general, similar in complexity
to discovering software flaws, which makes this problem at least