How Can Reverse Engineering of Network Protocols Improve Security