RFID Malware: Design Principles and Examples