Conclusion
Properly designing embedded security systems requires an understanding of what you are trying to protect in your product, why you are protecting it, and what types of attackers will likely target your product. Based on those factors, there are a wide variety of secure hardware design features you can implement to make a successful attack more difficult (but never 100% preventable).