Assessing and Exploiting
Control Protocols