This work is supported in part by a Center for Academic Excellence (CAE) Cyber Security Research Program grant (Grant Award Number H98230-15-1-0270) from the National Security Agency (NSA) and a National Science Foundation (NSF) grant (Award No. 1515636). Opinions expressed are those of the authors and not necessarily of the granting agencies.