* This version has been accepted in ACM Transactions on Cyber-Physical
Systems (TCPS). A preliminary version of this paper was accepted in ACM
Conference on Data and Application Security and Privacy (CODASPY) 2019. arXiv
admin note: substantial text overlap with arXiv:1901.08618 Access Paper or Ask Questions