Conduct research on hardware security vulnerabilities, threat models, and potential mitigations. Analyze and evaluate hardware architectures for potential security weaknesses, including ASICs, System-on-Chip devices, microcontrollers, memory devices, etc. Develop proof-of-concepts...