Hardware Vulnerability Exploitation