How Reverse Engineering of Network Protocols Improves Security