Architectural Vulnerabilities In Plug-And-Play Systems