Trojan horse attacks-trojan horse attacks - this attack involves a rogue, trojan horse application that has been planted on an unsuspecting users workstation. the trojan horse waits until the user submits a valid pin from a trusted application, thus enabling usage of the private key, and then asks the smartcard to digitally sign some rogue data. the operation completes but the user never knows that their private key was just used against their will. physical attacks involve physical access to hardware such as a network cable or keyboard. social engineering attacks are based on taking advantage of human interaction rather than technology itself. (frequently, social engineering attacks dont even require access to a computer.) there is no such thing as a logical attack, although many attacks do involve the use of logic to figure out how an application works and where its security vulnerabilities may be.