A more dangerous example is the attack to
the Trusted Platform Module (TPM). As we know, in a
trusted computing platform, TPM is the root trust of the
platform and it must be absolutely trusted. However, TPM is
also at risk in the hardware attack scenario. For example