Exploring the arsenal of software reverse engineering tools in the battle for embedded system security