6.7 How Secure and Verified is your Cyber-Physical System?