Securing Embedded Systems using Threat Based Analysis Methodologies