Evolving Attacker Perspectives for Secure Embedded System Design