Finding Security Holes In Hardware

Emphasis on performance, backward compatibility and system complexity are creating vulnerabilities that are difficult to fix.