Security Issues in Hardware/Firmware interaction – Can a formal analysis of (just) the hardware help?