Evaluating hardware security