Securing Deployed Cryptographic Systems