Secure Systems From Insecure Components