Read Practical Embedded Security : Building Secure Resource Constrained Systems 2008