How might an embedded system be attacked?