Trust, but verify: Why and how to establish trust in embedded devices