While this method has proven effective against software hackers, other methods of accessing sensitive programs or data remain a challenge. [0007] One such method is the penetration of the physical package containing electronic components such as processors, logic circuits, or other circuits or components, as well as various memory devices used to store programs or data.