Hardware Attacks and Mitigation Techniques