Physical attacks can is probably 2 or more of the below, but not all of them):
- Discover stored secret keys in a hardware device
- Measure the power consumption of a processor
- Break the cryptographic algorithm used, not just the hardware implementation
- Discover memory addresses that are being accessed