How to identify hardware vulnerabilities