Adversary Models Do we need new adversary models for embedded systems and networks? What should be this adversary model? What are the new threats? Incorporate characteristics of embedded systems and networks? Can we enumerate all the treats? Can we develop a universal adversary model? Superset of all possible adversary models Can we develop a process or methodology to identify new threats to new technologies? What else? Virgil v.s. Kang v.s. Radha v.s. Gene v.s. … Performance/security metrics Countermeasures …