Microprocessor Systems Require End-to-end Security