Software-controllable device functionality such as power and clock management permits unauthorized corruption of bits.