Mаtt wаnts tо prevent аttackers frоm capturing data by directly cоnnecting to the hardware communications components of a device he is building. What should he use to make sure that communications between the processor and other chips are not vulnerable?