That kind of a hardware attack is highly dependent on the architecture. For the Xbox 360, it just so happened that pulling down the hardware reset line to ground on the CPU during boot caused the currently active thread to be dropped and return a "correct" looking error. That effectively disabled the security on the boot-code, letting unsigned code to be started from there. I think you're thinking more like the Wii U hardware attack that was used to retrieve the secure keys. The clock line would likely not be susceptible, as it is likely inside the SOC with a built-in crystal, and only a clock-out for sync with the other chips on the board. You'd have better luck cutting the input voltage line and modifying the voltage until it has only just enough to start. From there, you'd have to hope it makes the SOC go wonky, and yet still boots enough to launch the attack and retrieve whatever did go though. If we had a datasheet on the SOC, it would be much more viable, of course. I somehow doubt we'll see one anytime soon though.