Securing the Systems of the Future - Techniques for a Shifting Attack Space