8.2 We are all hackers: design and detection of security attacks