antivirus security threat model smart card module buffer overflow software vulnerabilities exploit software security security smart card deployment firewall