In the past decade, we have seen an increasing number of software-based attacks on increasingly complex hardware. Why don't you just check the hardware documentation? The hardware documentation we would need here is usually not available to us but only to a small set of employees of the corresponding hardware manufacturer.....
By: Daniel Gruss
Full Abstract & Presentation Materials:
https://www.blackhat.com/asia-20/briefings/schedule/#complexity-killed-security-21681