False Positives in Embedded Security and How to Eliminate Them