How Hackers Bypass Hardware-Based Security Systems