Here are a couple examples of physical access leading to key extraction. You're welcome to be pedantic (those are side channel attacks, they don't defeat the boundary!) but one way or another, physical access wins.
https://www.cl.cam.ac.uk/~rnc1/descrack/
https://ninjalab.io/eucleak/