Implementation of Complex Strategies of Security Insecure Embedded Systems | IEEE Conference Publication | IEEE Xplore