Hardware Security Is Hard: How Hardware Boundaries Define Platform Security