7.7 Toward Correct and Secure Embedded Systems